SXSW: Three Cybersecurity, Remote Access Takeaways from Austin

March 30, 2015 Added by:Patrick Oliver Graf

The South by Southwest (SXSW) Interactive Festival wrapped up last week in Austin, Texas, where 65,000 industry movers and shakers learned about some of the most innovative technology expected to hit the market over the next few years. What was on the minds of presenters, panelists, and attendees alike? “The Future” – all of its possibilities and its promise.

Comments  (0)


Threat Intelligence: A Force Multiplier for Security Pros

March 26, 2015 Added by:Joseph Pizzo

With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.

Comments  (0)


Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security

March 26, 2015 Added by:Kevin Watson

The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.

Comments  (0)


China Named Top Originator of Attack Traffic in Q4 2014: Akamai

March 26, 2015 Added by:Brian Prince

A new report from Akamai Technologies names China as the top source of attack traffic on the Web.

Comments  (0)


Understanding Internet Protocol Security (IPsec)

March 25, 2015 Added by:Barracuda Networks

IPSEC is the most popular form of VPN used today. It is important to understand how IPSEC works in order to trouble shoot issues with IPSEC tunnels.

Comments  (0)


CSIS Issues Recommendations for Threat Intelligence Sharing

March 25, 2015 Added by:Anthony M. Freed

The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.

Comments  (0)


Air-Gapped Computers Can Communicate Through Heat: Researchers

March 24, 2015 Added by:Eduard Kovacs

Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.

Comments  (0)


Stop Relying on IP-based Security Before My Coffee Maker is Hit by a DDoS Attack

March 23, 2015 Added by:Tripwire Inc

Last week, the Internet fell over itself to report on a botnet allegedly comprised of 100,000 smart devices. Things. The Internet of Things had finally attacked!

Comments  (0)


Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (0)


Taking Advantage of Critical Infrastructure Cybersecurity

March 18, 2015 Added by:Tripwire Inc

A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.

Comments  (0)


Retail and Financial Services Sectors Wary of Insider Threats

March 18, 2015 Added by:Anthony M. Freed

The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.

Comments  (0)


6 Architecture Considerations When Deploying PAM

March 17, 2015 Added by:Identropy

Designing a PAM archetecture for your organization will be an iterative process. Expect to repeat conversations as more factors and perspectives are brought into the conversation.

Comments  (3)


Lessons From Hillary Clinton's Email Security Oversight

March 16, 2015 Added by:Peter Zavlaris

Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.

Comments  (4)


The Battle Has Moved to the Endpoints and Beyond

March 11, 2015 Added by:Peter Zavlaris

While organizations may be adding solutions to their arsenals to combat threats at the endpoint, they may want to consider what else constitutes their perimeter.

Comments  (6)


Public Sector Increasingly Targeted by Powerful DDoS Attacks

March 11, 2015 Added by:Anthony M. Freed

The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.

Comments  (10)


Seagate Downplays Risks Posed by Business NAS Flaws

March 11, 2015 Added by:Eduard Kovacs

Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »