Information Security

36317a78f97d1d6d7a02333ad01186fa

New Approaches for Blocking Zero-Day Exploits to Prevent APTs

April 16, 2013 Added by:George Tubin

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Are We Ready to be Consumers of Security Intelligence?

April 15, 2013 Added by:Tripwire Inc

Security teams need the right skills in order to ‘ready’ themselves for action, and before we get to engage in some some really advanced security intelligence, big data analysis, haddop, threat intelligence and a myriad of other buzz words, we will need to be able to accomplish the basics first.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Enter the CISO: Torchbearer of Security and Risk Management

April 06, 2013 Added by:Anthony M. Freed

In a convergence culture, accountability for risk is accepted across the organization, and when that happens, risk management becomes a priority to the business, informing strategy and objectives. By helping identify and mitigate risk across finance, operations and IT, the CISO puts security in context of what could affect profit.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending the Corporate Domain: Strategy and Tactics

March 27, 2013 Added by:Rafal Los

Strategy without accompanying tactics is a lost cause. Tactics without a solid footing in strategy is an expensive lost cause. The maturity of an organization's security team is directly proportional to their ability to have a foundational strategy and be able to implement tactical measures and feedback to adjust to changing conditions in order to defend adequately.

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Congress is Hurting the U.S. Regarding Cybersecurity

March 19, 2013 Added by:Joel Harding

If Congress doesn’t wake up and begin asking serious questions around cybersecurity, their inattention is going to cause us great harm in the coming years.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Castle Has No Walls - Introducing Defensibility as an Enterprise Security Goal

March 19, 2013 Added by:Rafal Los

It's time to retire the "castle" analogy when it comes to talking about how real Information Security should behave. I still hear it used a lot, and if you walked around the show floor at RSA 2013 you noticed there is still a tremendous amount of focus and vendor push around 'keeping the bad guys out.'

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Ben Rothke on the Five Habits of Highly Secure Organizations

March 18, 2013 Added by:Tripwire Inc

There are five habits of highly secure organizations, said Ben Rothke (@benrothke), Manager – Corporate Services Information Security at Wyndham Worldwide.

Comments  (1)

875b62bb8cdfb9fb199603e9e24a54a6

Despite a Decade of Security Upgrades, Windows Vulnerabilities Still Exist

February 22, 2013 Added by:Mark Austin

Windows 8 is touted, rightfully so, for being the most secure Windows operating system yet. However, it would be a mistake to believe that Windows 8 does not require external security enhancements.

Comments  (0)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Security Analytics: Hype or Huge?

February 01, 2013 Added by:Simon Moffatt

This complex chain of correlated "security big data", can be used in a manner of ways from post-incident analysis and trend analytics as well as for the mapping of internal data to external threat intelligence. Big data is here to stay and security analytics just needs to figure out the best way to use it...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Phones in China Hit by Most Costly Malware in History

February 01, 2013 Added by:Dan Dieterle

China may be the source for a lot of international cyber attacks and malware, but they get hit by it too. 620,000 Android phones in China were infected with a nasty virus that collects personal information and begins to send costly text messages to benefit the malware maker...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Case for National Cyber Labs

January 31, 2013 Added by:Don Eijndhoven

Cyber Ranges as these networks are now often referred to, are fun! And they’re extremely useful in developing real-world skills without disappearing behind bars. It’s not even a new idea; various militaries have been doing it for a while now...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

It's Time for Transparency Reports to Become the New Normal

January 31, 2013 Added by:Electronic Frontier Foundation

A transparency report would allow Skype and Microsoft to set the record straight and permit users to make an informed decision about the surveillance risks they’ve taking when they use their product. With great user data comes great responsibility...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What’s on Your Phone? A Lot More than You Realize

January 31, 2013 Added by:Robert Siciliano

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Implementing a Data De-Identification Framework

January 29, 2013 Added by:Rebecca Herold

Marketing organizations salivate at the prospects of doing advanced analysis with such data to discover new trends and marketing possibilities. The government wants to use it for investigations. Historians want to use it for, yes, marking historical events. And the list could go on...

Comments  (0)

Default-avatar

UPnP Security Flaws Expose 40-50 Million Networked Devices

January 29, 2013 Added by:Infosec Island

Researchers at Rapid7 have uncovered that roughly 40-50 million network-enabled devices are at risk due to vulnerabilities in the Universal Plug and Play (UPnP) protocol.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »