SCADA

Bd07d58f0d31d48d3764821d109bf165

Proactively Hardening Systems Against Intrusion: Configuration Hardening

May 13, 2014 Added by:Tripwire Inc

What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Researchers Find Evidence of Bogus Certs Used in HTTPS Connections

May 12, 2014 Added by:Anthony M. Freed

Though the threat has been recognized in theory for some time, researchers have now found direct evidence that bogus digital certificates not issued and authorized by legitimate site owners have been employed in establishing seemingly secure HTTPS connections.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

DOE Cyber Security Procurement Language – Is It Comprehensive Enough

May 06, 2014 Added by:Joe Weiss

DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Acquires Industrial Control System Cybersecurity Conference Series

April 28, 2014 Added by:InfosecIsland News

SecurityWeek announced that it has acquired the ICS Cybersecurity Conference series, the leading organizer of cybersecurity-focused events for the industrial control systems sector.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Heartbleed Facts and Fictions

April 28, 2014 Added by:Rebecca Herold

Here are the most common questions, and associated answers, that I’ve received from several of my small- to midsized clients about Heartbleed that have involved the most confusion; let’s clear up that misunderstanding!

Comments  (0)

666ef5d32e74e7402aab206bbe9cccda

The Enterprise Network: Effective Protection Strategies

April 24, 2014 Added by:John Grady

The first step is to think strategically, which means creating policies and procedures aimed at the enterprise network as a whole rather than handling issues case by case.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit

April 21, 2014 Added by:Dan Dieterle

You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the latest modules from Metasploit you can quickly see the exploit in action.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Understanding What Constitutes Your Attack Surface

April 21, 2014 Added by:Tripwire Inc

Put simply, your attack surface is the sum of your security risk exposure. Put another way, it is the aggregate of all known, unknown and potential vulnerabilities and controls across all software, hardware, firmware and networks.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI Plans to Have 52 Million Photos in its NGI Face Recognition Database by Next Year

April 14, 2014 Added by:Electronic Frontier Foundation

New documents released by the FBI show that the Bureau is well on its way toward its goal of a fully operational face recognition database by this summer.

Comments  (0)

Default-avatar

IAM Proofs of Concept (POC) - An Inefficient Use of Time and Money

April 08, 2014 Added by:Ranjeet Vidwans

Identity and Access Management is as much about process as it is technology.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Bipartisan Policy Committee Report on Cyber Security of the Electric Grid – What’s Missing

March 17, 2014 Added by:Joe Weiss

I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Threat Intelligence Sources

March 05, 2014 Added by:Anton Chuvakin

Where does threat intelligence come from?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

SOHO pharming attack hit more that 300,000 devices worldwide

March 04, 2014 Added by:Pierluigi Paganini

Another mass compromise of small office/home office (SOHO) wireless routers has been uncovered by researchers from security firm Team Cymru.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congress Must Update Email Privacy Law

February 27, 2014 Added by:Electronic Frontier Foundation

A bill co-sponsored by Reps. Kevin Yoder, Tom Graves, and Jared Polis—HR 1852, The Email Privacy Act—seeks to update ECPA by requiring a probable cause warrant whenever the government wants to access your online private messages.

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

What's The Next Reflection Attack

February 20, 2014 Added by:Alan Woodward

Two years ago we were all talking about DNS reflection attacks and the possibility that they may make an appearance. A year later they did just that, and on a massive scale.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How to Make Better Threat Intelligence Out of Threat Intelligence Data?

February 19, 2014 Added by:Anton Chuvakin

One of the key uses for threat intelligence (TI) data is making better threat intelligence data out of it.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »