Blog Posts Tagged with "Networks"

44fa7dab2a22dc03b6a1de4a35b7834a

A Security Resolution for Developers

February 22, 2012 Added by:Bill Gerneglia

You can’t understand how applications will be attacked if you don’t know how they work. Applications ultimately transmit data and operate on hardware in a network. Developers need to understand protocols, dependencies, communications, encryption, and more...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Four Cloud Trends on the CIOs Radar

August 26, 2011 Added by:Bill Gerneglia

Data Center Transformation: CIOs are feeling the stress of virtualization. The goal is to have more than 100 VMs on each server by 2012. That’s putting stress on the netwok and storage infrastructures which look outdated. The CIO needs to consider the impact of this stress...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

39b6d5c1d3c6db11155b975f1b08059f

Debriefing: NERC CIP 011 Standards

March 31, 2011 Added by:Ron Lepofsky

The standards have been recently filed with FERC for approval for the US and with a variety of Canadian provincial authorities. To assist on CIP developments directly from the NERC site, I'm providing a navigation guide to get you directly to where you need to go...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Experts Continue Efforts to Define Cyber War

February 24, 2011 Added by:Headlines

Ultimately, the attribution and origin of an attack combined with the current political environment will determine if a cyber offensive will be characterized as an act of "warfare", and it may not be until after the fact that we can all agree that we know know an act of cyber war when we see one...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

Why does Web App Security Continue to Stink?

February 21, 2011 Added by:Andy Willingham

Many security issues arise from assuming that the advice of someone else (consultant, vendor) is going to keep you secure. Companies are rolling out web based applications faster than they realize. When you don’t know how many web apps you have, you have bigger problems than just securing them...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NASDAQ Issues Statement on Security Breach

February 09, 2011 Added by:Headlines

"We detected suspicious files on the U.S. servers unrelated to our trading systems and determined that our web facing application Directors Desk was potentially affected. We immediately conducted an investigation, which included outside forensic firms and U.S. federal law enforcement..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Smart Card Authentication Cracked by Hackers

January 29, 2011 Added by:Headlines

When the smart card is inserted into a compromised PC, the hackers use the opportunity to attempt to access the server. When the system requests a digital token, the attackers redirect the request to the compromised PC, which provides the token and password stolen with the keylogger...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Why Microsoft Shops Have to Worry About Security

January 26, 2011 Added by:Danny Lieberman

If you are a real hacker, look for companies with security administrators who are certified for Microsoft ISA server and you will have nothing to worry about. But if your target security administrators are facile with Wireshark, Ratproxy and Fiddler and Metasploit, then you should be really worried...

Comments  (12)

800ca77bf7ad76b2a830356569e524b7

On IT Security History and Architecture

January 17, 2011 Added by:Dr. Steve Belovich

There are no quick fixes to this growing problem. One thing, however, is almost certain: The growing body of lawsuits on identity theft, medical record theft, software security, safety and reliability issues will lead to federal and/or state regulation...

Comments  (0)

0b8d1c9dc5f4a80e6646d8d18b8683fe

Left the Back Door Unlocked?

January 14, 2011 Added by:Ben Keeley

Your organization may defend against malware, may defend against password brute forcing, and possibly even be able to detect a port scan but do they defend against something as ‘good-natured’ as someone browsing the domain for open shares from a well placed sensitive server?

Comments  (0)

A08e32d2f9a8b78894d964ec7fd4172e

Implementing Bidirectional Forwarding Detection

January 13, 2011 Added by:Stefan Fouant

Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Government Agencies Need to Comply with Directive

January 08, 2011 Added by:Danny Lieberman

Yes – there is apparently a White House directive to keep Wikileaks documents off Federal networks – according to a directive from the White House Office of Management & Budget on the treatment of classified documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

High-Frequency Stock Trading Networks Vulnerable

January 07, 2011 Added by:Headlines

A former IBM research fellow has identified vulnerabilities in high-frequency stock trading networks that could allow hackers to manipulate trades by inflecting minute latencies that could result in significant aberrations to real-time stock prices, netting millions...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

Getting Results the Wrong Way

January 03, 2011 Added by:Andy Willingham

Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Making the Network Secure in 2011

December 25, 2010 Added by:Simon Heron

IT managers are right to be wary of new threats like viruses coming in on infected devices such as USB sticks (like Stuxnet) or mobile devices, which pose an increasing threat. However there is a more pressing threat to network security...

Comments  (0)

Page « < 1 - 2 > »