Software

Af7244bb99debb4a1152fa49a993a05c

Flaws in Secure Messaging App Telegram Expose Chats

February 23, 2015 Added by:Eduard Kovacs

Telegram, the popular cross-platform messaging app said to be built with a focus on speed and security, is plagued by some serious vulnerabilities that can be exploited to gain access to users’ messages, researchers reported on Monday.

Comments  (4)

673de21f2652135087d940b7f65c4b5e

The Five Things CSOs Need to Know About Software-Defined Security

January 19, 2015 Added by:Carson Sweet

Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.

Comments  (2)

6ee5846e0a227db0333ff7c99ff61313

When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (1)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

31b3b31a1c2f8a370206f111127c0dbd

Are You Playing Security ‘Elf on the Shelf’?

December 23, 2013 Added by:Steve Lowing

While your end users may act like children from time to time, your security practices shouldn’t treat them like they are. Gain visibility and control before being placed on the naughty list.

Comments  (0)

631e72bff10f695d4be8dec9d08d7534

Preparing for the Internet of Things: Integrating Strong Authentication in Daily Life

November 04, 2013 Added by:Jochem Binst

The online world as we know it today is not the same as the one we got to know in the beginning of the Internet era and certainly not the one that is emerging today! People worldwide are starting to realize this. All they have to do now is act on it. Strong authentication to secure the online world will be embraced since it becomes a necessity; using strong authentication is the next step.

Comments  (0)

514b2ac354098d84c07620f2591193b2

What Is Your Browser Doing Behind Your Back?

October 09, 2013 Added by:Kyle Adams

Browsers have become extremely complex over the last few years, so does everyone fully understand everything a modern browser does? Of course everyone is familiar with the point and click, redirections, forms . . . normal Web stuff. What you might not know, is that your browser does a lot of things automatically without you asking it to.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

CISOs Share Top 10 Tips for Managing IT Security Vendors

July 31, 2013 Added by:InfosecIsland News

Austin-based Wisegate has released a report that provides top 10 tips from leading CISOs to help IT professionals manage security vendors.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Subtleties of Enterprise Security Vulnerability Management — at Scale

July 11, 2013 Added by:Rafal Los

Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Addressing the Open Doors in Your APT Strategy

July 10, 2013 Added by:InfosecIsland News

With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits. (Re...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Wanna Be a Security Rock Star? Practice Like One…

July 06, 2013 Added by:Tripwire Inc

When was the last time you rehearsed your security script? Are you comfortable with your tools? If you want to be a security rock star, you should practice like one.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Castle Has No Walls - Introducing Defensibility as an Enterprise Security Goal

March 19, 2013 Added by:Rafal Los

It's time to retire the "castle" analogy when it comes to talking about how real Information Security should behave. I still hear it used a lot, and if you walked around the show floor at RSA 2013 you noticed there is still a tremendous amount of focus and vendor push around 'keeping the bad guys out.'

Comments  (1)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

Default-avatar

UPnP Security Flaws Expose 40-50 Million Networked Devices

January 29, 2013 Added by:Infosec Island

Researchers at Rapid7 have uncovered that roughly 40-50 million network-enabled devices are at risk due to vulnerabilities in the Universal Plug and Play (UPnP) protocol.

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Power to the People and the Coming AppSec Revolution

January 24, 2013 Added by:Fergal Glynn

It used to be that you could call for more secure software from individual vendors – and Microsoft heeded that call with its push for trustworthy computing in 2002 – but today we’re more dependent on software and more interconnected than ever. We rise and fall by the security of our associates...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Value of Secure Coding Procedures

January 09, 2013 Added by:Don Eijndhoven

I recently had a very interesting conversation with Dave Hyman of Checkmarx, who asked me how I saw the future of cyber security (or information security, take your pick). Now, as I’m sure you´ll agree with me, that’s a fairly abstract question that can go a lot of ways. My friends will confirm that I enjoy waxing philosophical discussions like that, but given what Checkmarx does with code se...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »