Enterprise Security

E595c1d49bf4a26f8e14ce59812af80e

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

August 26, 2013 Added by:Patrick Oliver Graf

Experts warn that within the next several years, the RSA public key cryptography system could even potentially become obsolete. If that is the case, how will enterprises be able to ensure secure remote access in the near-future?

Comments  (1)

52a995fead03e1d828980d4b3efd2719

Today's Mobile Device Data Protection Must Go Beyond Encryption

August 21, 2013 Added by:Cam Roberson

Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Gaining a Data Security Edge with Social Threat Detection

August 16, 2013 Added by:Vince Schiavone

From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.

Comments  (0)

3a51104c66686fac95156c1a1d632bd4

If you Knew you Were Going to be Attacked, What Would you do Differently?

August 14, 2013 Added by:Bill Wheeler

Recent reports have found that cyberattacks against U.S. corporations are on the rise, along with an increase in international threats, especially from China, and emerging threats to small businesses. Today, it’s not a matter of if an organization will be the victim of a cyberattack, but when.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Black Hat 2013: Key Takeaways on Remote Access Security

August 12, 2013 Added by:Patrick Oliver Graf

With the books closed on what was quite possibly the most controversial Black Hat conference ever, let’s take a few minutes to reflect on all of the hot button issues relating to remote access that spurred vigorous discussions and debates at this year’s event. Here are a few of our favorite remote access-related topics from Black Hat 2013.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Failures: Value of the Human Firewall

August 07, 2013 Added by:Jon Stout

The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

PKI for Authenticating Remote Access VPNs: How Government Agencies Ensure Secure Communications

August 02, 2013 Added by:Patrick Oliver Graf

With many documents critical to matters of national security being accessed on a daily basis, government agencies must ensure that all users trying to establish connections of any type to their networks are who they say they are, that they are authorized to access locations that they are connecting to and that all communications are encrypted.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

CISOs Share Top 10 Tips for Managing IT Security Vendors

July 31, 2013 Added by:InfosecIsland News

Austin-based Wisegate has released a report that provides top 10 tips from leading CISOs to help IT professionals manage security vendors.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security – Is Offensive Cyber Security Necessary?

July 31, 2013 Added by:Jon Stout

The country is at war and it is a cyber security war. The enemies are many, diverse and competent and fighting a defensive war is not the best way to win. Cyber security war is like any other war- taking the offensive will improve your chances of success. Like any other war, the cyber security war requires proper planning for success and a total winning strategy. Half hearted measures will not ...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

F66c1a87a8db2cb584b4e06e93a84ce3

Unfolding ‘DOUBLE TWINS’ Deception Scheme

July 29, 2013 Added by:Mikko Jakonen

‘DOUBLE TWINS‘ is deception scheme combining modern world speed, easiness to run anonymous with Internet and difficulties with real corporate and personal identity verification. What makes it most interesting; it was ‘quick in – quick out’ – job, completed within 3 weeks from the start.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

2-Factor Is Great, But Passwords Still Weak Spot

July 17, 2013 Added by:Simon Moffatt

Two factor authentication solutions have been around for a number of years. While these additional processes certainly go some way to improve security, and reduce the significance of the account password, it highlights a few interesting issues, mainly that password based authentication is still a weak link.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Michael Santarcangelo on the Value Imperative Mindset in Security

July 12, 2013 Added by:Anthony M. Freed

To better understand how we as security professionals can hone our messaging across the organization and up the corporate food chain to elicit the responses we are seeking, we recently spoke at length with Michael Santarcangelo of Security Catalyst, widely recognized in the security field as an effective communicator and catalyst for change and improvement.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »