Enterprise Security

E595c1d49bf4a26f8e14ce59812af80e

Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password

January 29, 2015 Added by:Patrick Oliver Graf

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?

Comments  (7)

306708aaf995cf6a77d3083885b60907

Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?

January 27, 2015 Added by:Anton Chuvakin

Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.

Comments  (5)

Ebe141392ea3ebf96ba918c780ea1ebe

Looking Logically at Legislation

January 27, 2015 Added by:Wendy Nather

There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis of it. There's also a lot of defensive and emotional reaction to it ("ZOMG we're going to be illegal!").

Comments  (5)

Fc152e73692bc3c934d248f639d9e963

End of Life

January 27, 2015 Added by:PCI Guru

This topic has started to come up again as we go through PA-DSS research on applications and find that the listings contain operating systems that are at or past end of life (EOL).

Comments  (6)

Bd07d58f0d31d48d3764821d109bf165

The State of Obama Cybercare

January 26, 2015 Added by:Tripwire Inc

Over the past few years, we have seen cybersecurity move from the realm of IT into the boardroom and now onto the political stage. The reason for this is clear—the resiliency, security and safety of the Internet is critical to our economy and the progress of our society as a whole. It is our future.

Comments  (4)

B64e021126c832bb29ec9fa988155eaf

Bringing Metasploit Exploits to Life with PowerShell

January 26, 2015 Added by:Dan Dieterle

You have a remote shell to a Windows box in Metasploit, very cool, but what can you do?

Comments  (4)

E6258b956c06d8dbabbde10d4919e5ef

Three Compliance Trends to Watch in 2015

January 26, 2015 Added by:Mav Turner

Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.

Comments  (4)

E595c1d49bf4a26f8e14ce59812af80e

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

January 22, 2015 Added by:Patrick Oliver Graf

Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?

Comments  (4)

0ead717779244d9aab5c1699308850d2

Security Spending Wasted When Software Goes Unimplemented

January 21, 2015 Added by:Brian Prince

According to a new survey of 172 IT decision makers and influencers in both enterprises and small to midsized businesses, 28 percent of organizations are not getting the most bang for their buck when it comes to their security investments.

Comments  (5)

E313765e3bec84b2852c1c758f7244b6

Cyber-Civic Responsibility

January 21, 2015 Added by:Brent Huston

The only thing that really has a chance of working is if we all start taking responsibility for our own share of the problem.

Comments  (5)

Bd07d58f0d31d48d3764821d109bf165

Social Engineering: How Dangerous is Your Lunch Break?

January 15, 2015 Added by:Tripwire Inc

If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.

Comments  (1)

21d6c9b1539821f5afbd3d8ce5d96380

Fear Hackers? First Invest in an IT Security Culture Change

January 14, 2015 Added by:Kevin L. Jackson

With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Analytics – Finally Emerging For Real?

January 13, 2015 Added by:Anton Chuvakin

Security analytics – a topic as exciting and as fuzzy as ever!

Comments  (3)

93c815429fc1ab15a9295a4f55989ae0

Operational Security - Home Rules

January 12, 2015 Added by:Neohapsis

What we tell those we advise in business also applies to friends and family; the time you spend preparing now may save you countless hours of worry and expense down the road.

Comments  (5)

E313765e3bec84b2852c1c758f7244b6

Young IT Professionals, Cybercrime, Script Kiddies & CyberWarriors, OH MY!

January 12, 2015 Added by:Brent Huston

Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.

Comments  (3)

Page « < 3 - 4 - 5 - 6 - 7 > »