Blog Posts Tagged with "Security"
May 31, 2011 Added by:Global Knowledge
I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...
May 31, 2011 Added by:Luis Corrons
In a few years’ time, besides protecting ourselves against cyber-attacks we will also have to look for mechanisms that guarantee our rights against government abuse of power. Some people are talking about the introduction of “Internet passports” to identify Internet users...
May 28, 2011 Added by:Chris Blask
Behind all the technology and corporations and globe-spanning markets and networks there are individual human beings. The actions and intent of those individuals shines through the layers between them and the rest of us like arc lights through kleenex. There is no replacement for intent...
May 27, 2011 Added by:Emmett Jorgensen
Using a Bare-Metal-Boot Mode, these devices never have to touch the hard drive of the host machine, and with capacities up to 128GB, there is plenty of room for data storage as well. Add to that encryption and dual factor authentication and you’ve got an incredibly secure device...
May 25, 2011 Added by:Headlines
“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."
May 25, 2011 Added by:Headlines
“The survey shows that there is clearly room for improvement by the mobile operator community in addressing PCI DSS compliance, and it is critical that operators not yet compliant take appropriate measures to ensure the security of their customer’s sensitive cardholder data..."
May 22, 2011 Added by:Global Knowledge
Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...
May 19, 2011 Added by:Emmett Jorgensen
Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...
May 18, 2011 Added by:Robb Reck
By using a well-tested framework we can ensure that our organization’s security needs are adequately documented. The policies are critical, but they are only the framework. To flesh out the program we need the actual implementation, and that’s where the rest of the staff comes in...
May 17, 2011 Added by:Robert Siciliano
At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...
May 16, 2011 Added by:Headlines
"As of May 13, Sony was incomplete in exercising measures that they said they will do on the May 1 press conference," said Kazushige Nobutani, Japan's director of media and content in the country's Ministry of Economy, Trade, and Industry...
May 16, 2011 Added by:Rafal Los
The reality of the situation is that we don't have any good answers. I've been looking unsuccessfully for some type of guidance that doesn't rely on the underlying mobile OS to protect the application - but that's really a fool's errand anyway...
May 13, 2011 Added by:Headlines
The new authentication feature allows users the option of requiring that a one-time numeric authentication code be entered in addition to the standard username/password combination if the network detects a login attempt from a device that has not been previously saved by the user...
May 09, 2011 Added by:Headlines
The bill prohibits any engagements “to develop, design, plan, promulgate, implement or execute a bilateral policy, program, order, or contract of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company..."
May 04, 2011 Added by:Gurudatt Shenoy
Unless people take seriously the risks of online commerce and information sharing, it is not going to get better any time soon. My message is simple, I should be the owner and manager of my information and security, not some data center administrator on the cloud...
May 03, 2011 Added by:Eric Irvin
It's important that we continue to listen as much as we talk, and dissect statements, data, and ideas as critically as possible. As the world of Information Security grows, we can not afford to be spoon-fed our thoughts and ideas from speakers, magazine articles, and vendors...
Update 3: Hackers May Leak Norton Antivirus ... Bill Phillips on 09-17-2014
Mobile Security: Tips for Using Personal Dev... franklin le on 09-17-2014
Don’t Let Your Guard Down: Tragedies Pave ... Assignment Master on 09-17-2014