Enterprise Security

Fafdf1720f4df1d41c6eacbd2429a06b

Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease?

April 01, 2014 Added by:Tal Be'ery

One of the new security features in the latest Windows release (Windows 8.1) is the “Restricted Admin mode for Remote Desktop Connection”. This measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket. However, it appears that cure might be worse than the disease as the new “Restricted Admin mode” opens a new attack surface for the...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Full Disclosure: The Rebirth

March 31, 2014 Added by:Tripwire Inc

Today, Full Disclosure is alive again, the advisories are flowing, the banter is cheerful, and the trolling has already started.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Reforming Terms of Service: Microsoft Changes Its Policy on Access to User Data

March 31, 2014 Added by:Electronic Frontier Foundation

We commend Microsoft for its willingness to reconsider its policies, and we think it made the right decision.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Be Wary: Hackers are Readying Security Updates for XP Users

March 27, 2014 Added by:Tripwire Inc

Approximately 40% of PC users still run desktop versions of Windows XP as well. Windows XP has been regarded by many as the best version of Windows ever.

Comments  (0)

21bc599fa4dd7ac5d5367f4398458adc

When Security Tools Cry Wolf

March 27, 2014 Added by:Ken Westin

With the rising number and complexity of security tools at our fingertips, sometimes everything looks like an alert so nothing becomes actionable.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

The Power of Change

March 26, 2014 Added by:Wendy Nather

I believe that most of security relies on detecting and controlling change. And there are so many aspects to change that have to be considered.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How to Use Threat Intelligence with Your SIEM?

March 26, 2014 Added by:Anton Chuvakin

SIEM and Threat Intelligence (TI) feeds are a marriage made in heaven! Indeed, every SIEM user should send technical TI feeds into their SIEM tool.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Will the Demise of XP Shut Down Your Business…or Heart?

March 25, 2014 Added by:Rebecca Herold

According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

On Internally-sourced Threat Intelligence

March 20, 2014 Added by:Anton Chuvakin

At the very top of the very top of the pyramid...sit organizations that produce their own threat intelligence (TI), sourced from local artifacts and their own intelligence gathering activities.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

System Hardening: Defend Like An Attacker

March 18, 2014 Added by:Tripwire Inc

Defenders also need to think like attackers. Easier said than done.

Comments  (0)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Delving into Threat Actor Profiles

March 17, 2014 Added by:Anton Chuvakin

Threat actor profiles can be used by a fledgling threat intelligence operation to organize their knowledge about who is “out to get them” and who they observe on their network. Such knowledge organization helps prioritize incident response and alert triage activities.

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Target Should be Our Target

March 14, 2014 Added by:Wayde York

The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.

Comments  (0)

1789975b05c7c71e14278df690cabf26

Unbalanced Security is Increasing Your Attack Surface

March 13, 2014 Added by:Pete Herzog

Unbalanced security is when your security increases your attack surface. And it’s normal.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security Slice: World War XP

March 12, 2014 Added by:Tripwire Inc

Are these nine tips enough to protect organizations that need to continue using XP?

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »