Blog Posts Tagged with "Networks"
February 22, 2012 Added by:Bill Gerneglia
You can’t understand how applications will be attacked if you don’t know how they work. Applications ultimately transmit data and operate on hardware in a network. Developers need to understand protocols, dependencies, communications, encryption, and more...
August 26, 2011 Added by:Bill Gerneglia
Data Center Transformation: CIOs are feeling the stress of virtualization. The goal is to have more than 100 VMs on each server by 2012. That’s putting stress on the netwok and storage infrastructures which look outdated. The CIO needs to consider the impact of this stress...
August 23, 2011 Added by:Headlines
The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...
March 31, 2011 Added by:Ron Lepofsky
The standards have been recently filed with FERC for approval for the US and with a variety of Canadian provincial authorities. To assist on CIP developments directly from the NERC site, I'm providing a navigation guide to get you directly to where you need to go...
February 24, 2011 Added by:Headlines
Ultimately, the attribution and origin of an attack combined with the current political environment will determine if a cyber offensive will be characterized as an act of "warfare", and it may not be until after the fact that we can all agree that we know know an act of cyber war when we see one...
February 21, 2011 Added by:Andy Willingham
Many security issues arise from assuming that the advice of someone else (consultant, vendor) is going to keep you secure. Companies are rolling out web based applications faster than they realize. When you don’t know how many web apps you have, you have bigger problems than just securing them...
February 09, 2011 Added by:Headlines
"We detected suspicious files on the U.S. servers unrelated to our trading systems and determined that our web facing application Directors Desk was potentially affected. We immediately conducted an investigation, which included outside forensic firms and U.S. federal law enforcement..."
January 29, 2011 Added by:Headlines
When the smart card is inserted into a compromised PC, the hackers use the opportunity to attempt to access the server. When the system requests a digital token, the attackers redirect the request to the compromised PC, which provides the token and password stolen with the keylogger...
January 26, 2011 Added by:Danny Lieberman
If you are a real hacker, look for companies with security administrators who are certified for Microsoft ISA server and you will have nothing to worry about. But if your target security administrators are facile with Wireshark, Ratproxy and Fiddler and Metasploit, then you should be really worried...
January 17, 2011 Added by:Dr. Steve Belovich
There are no quick fixes to this growing problem. One thing, however, is almost certain: The growing body of lawsuits on identity theft, medical record theft, software security, safety and reliability issues will lead to federal and/or state regulation...
January 14, 2011 Added by:Ben Keeley
Your organization may defend against malware, may defend against password brute forcing, and possibly even be able to detect a port scan but do they defend against something as ‘good-natured’ as someone browsing the domain for open shares from a well placed sensitive server?
January 13, 2011 Added by:Stefan Fouant
Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...
January 08, 2011 Added by:Danny Lieberman
Yes – there is apparently a White House directive to keep Wikileaks documents off Federal networks – according to a directive from the White House Office of Management & Budget on the treatment of classified documents...
January 07, 2011 Added by:Headlines
A former IBM research fellow has identified vulnerabilities in high-frequency stock trading networks that could allow hackers to manipulate trades by inflecting minute latencies that could result in significant aberrations to real-time stock prices, netting millions...
January 03, 2011 Added by:Andy Willingham
Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...
December 25, 2010 Added by:Simon Heron
IT managers are right to be wary of new threats like viruses coming in on infected devices such as USB sticks (like Stuxnet) or mobile devices, which pose an increasing threat. However there is a more pressing threat to network security...
What PCI Requirements Apply to Us: Tacking a... Mic Micac on 09-19-2014
Today's Mobile Device Data Protection Must G... Mic Micac on 09-19-2014
Wireless Home Technologies Create Security R... Mic Micac on 09-19-2014