Blog Posts Tagged with "Security"
May 27, 2011 Added by:Emmett Jorgensen
Using a Bare-Metal-Boot Mode, these devices never have to touch the hard drive of the host machine, and with capacities up to 128GB, there is plenty of room for data storage as well. Add to that encryption and dual factor authentication and you’ve got an incredibly secure device...
May 25, 2011 Added by:Headlines
“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."
May 25, 2011 Added by:Headlines
“The survey shows that there is clearly room for improvement by the mobile operator community in addressing PCI DSS compliance, and it is critical that operators not yet compliant take appropriate measures to ensure the security of their customer’s sensitive cardholder data..."
May 22, 2011 Added by:Global Knowledge
Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...
May 19, 2011 Added by:Emmett Jorgensen
Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...
May 18, 2011 Added by:Robb Reck
By using a well-tested framework we can ensure that our organization’s security needs are adequately documented. The policies are critical, but they are only the framework. To flesh out the program we need the actual implementation, and that’s where the rest of the staff comes in...
May 17, 2011 Added by:Robert Siciliano
At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...
May 16, 2011 Added by:Headlines
"As of May 13, Sony was incomplete in exercising measures that they said they will do on the May 1 press conference," said Kazushige Nobutani, Japan's director of media and content in the country's Ministry of Economy, Trade, and Industry...
May 16, 2011 Added by:Rafal Los
The reality of the situation is that we don't have any good answers. I've been looking unsuccessfully for some type of guidance that doesn't rely on the underlying mobile OS to protect the application - but that's really a fool's errand anyway...
May 13, 2011 Added by:Headlines
The new authentication feature allows users the option of requiring that a one-time numeric authentication code be entered in addition to the standard username/password combination if the network detects a login attempt from a device that has not been previously saved by the user...
May 09, 2011 Added by:Headlines
The bill prohibits any engagements “to develop, design, plan, promulgate, implement or execute a bilateral policy, program, order, or contract of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company..."
May 04, 2011 Added by:Gurudatt Shenoy
Unless people take seriously the risks of online commerce and information sharing, it is not going to get better any time soon. My message is simple, I should be the owner and manager of my information and security, not some data center administrator on the cloud...
May 03, 2011 Added by:Eric Irvin
It's important that we continue to listen as much as we talk, and dissect statements, data, and ideas as critically as possible. As the world of Information Security grows, we can not afford to be spoon-fed our thoughts and ideas from speakers, magazine articles, and vendors...
May 02, 2011 Added by:Robert Siciliano
“Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has never made an announcement to its android-security-announce mailing list, although of course they have released many patches.."
April 26, 2011 Added by:Headlines
Veracode analyzed nearly five-thousand applications submitted to its cloud-based testing service over the period of eighteen months and found that more than half of the software had some sort of significant security flaw. “Software remains fundamentally flawed," the report states...
April 26, 2011 Added by:Anton Chuvakin
Perception of electronic and digital risks does not come naturally to people – and IT managers and directors are people too. So many organizations will severely underestimate computer risks and, sadly some would pay with their very existence for this mistake...
Making Sense of Split Tunneling ... nat ravitz on 03-08-2014
Why Enterprises Are Struggling So Much with ... Eric Kronthal on 03-07-2014
Making Sense of Split Tunneling ... nat ravitz on 03-07-2014