Security Training

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Why the Bridge Still Needs to be Built Between Operations and IT

June 04, 2014 Added by:Joe Weiss

When people complain that operators are too focused on safety and reliability I don’t know whether to laugh or cry.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

U.S. Agencies Need to Improve Cyber Incident Response Practices

June 04, 2014 Added by:Stefano Mele

The U.S. Government Accountability Office (GAO) found that twenty-four major federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a security breach of a computerized system and information).

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Lessons from Snapchat

June 03, 2014 Added by:Rebecca Herold

Oh, you’ve not heard yet? Or, you heard something about Snapchat but thought it was all about teens taking risqué photos that were then captured by screen shots?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Want Some More Bad News?

June 02, 2014 Added by:Wendy Nather

If so much of security relies on a contest of knowledge, then it's no wonder that so much of what we build turns into wet Kleenex at the drop of a (black) hat.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Effectively Communicating Attack Surface Analytics

June 02, 2014 Added by:Tripwire Inc

Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

As Security Technology Evolves…So Must We

May 28, 2014 Added by:Ali Golshan

Regardless of how automated as threat defense becomes, it is one area of security where people will never be automated out of a job. In fact, quite the opposite.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

"Back to Basics": What does this mean?

May 28, 2014 Added by:Dave Shackleford

So what ARE “the very basics”? And how exactly do we “get back to them”?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vigilance: Maintaining an Effective Enterprise Security Posture

May 27, 2014 Added by:Tripwire Inc

So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?

Comments  (0)

65be44ae7088566069cc3bef454174a7

Lessons from 3 Organizations That Made 3 Privacy Mistakes

May 22, 2014 Added by:Rebecca Herold

Existing privacy laws address only a fraction of the privacy risks that exist, and new risks are emerging all the time. Don’t put your customers, and innocent children’s, privacy at risk by doing things that may be legal, but still a very bad privacy action.

Comments  (0)

0b68e5c590b3463d8fe27a4b0e9434cd

Steinhafel is Dead, Long Live Steinhafel

May 15, 2014 Added by:Sonali Shah

“The King is dead, long live the King” speaks to the inevitability of succession. It is now not a stretch to think about the inevitability of future CEOs leaving power and ascending to power as a result of cyber breaches.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Proactively Hardening Systems Against Intrusion: Configuration Hardening

May 13, 2014 Added by:Tripwire Inc

What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On “Defender’s Advantage”

May 12, 2014 Added by:Anton Chuvakin

“The attacker can exploit just one vulnerability to get in, while the defender needs to protect all ways in.”

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Heartbleed, Open Source and Open Sores

May 08, 2014 Added by:Tripwire Inc

Now that things are settling down after Heartbleed, I think about some of the conversations I’ve had about OpenSSL and open source software over the past couple of weeks.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

DOE Cyber Security Procurement Language – Is It Comprehensive Enough

May 06, 2014 Added by:Joe Weiss

DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

The White House Big Data Report: The Good, The Bad, and The Missing

May 05, 2014 Added by:Electronic Frontier Foundation

Last week, the White House released its report on big data and its privacy implications, the result of a 90-day study commissioned by President Obama during his January 17 speech on NSA surveillance reforms.

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »