Blog Posts Tagged with "Security"
June 02, 2011 Added by:Headlines
“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way. Cybersecurity is now intertwined with international security, and you can't divorce it from that...”
June 02, 2011 Added by:Dejan Kosutic
This is the most detailed ROSI Calculator that can be found on the Internet, and it aims to calculate as precisely as possible whether the potential decrease of security incidents (i.e. the risk mitigation) will outweigh the investment in security measures. It's completely free...
May 31, 2011 Added by:Global Knowledge
I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...
May 31, 2011 Added by:Luis Corrons
In a few years’ time, besides protecting ourselves against cyber-attacks we will also have to look for mechanisms that guarantee our rights against government abuse of power. Some people are talking about the introduction of “Internet passports” to identify Internet users...
May 28, 2011 Added by:Chris Blask
Behind all the technology and corporations and globe-spanning markets and networks there are individual human beings. The actions and intent of those individuals shines through the layers between them and the rest of us like arc lights through kleenex. There is no replacement for intent...
May 27, 2011 Added by:Emmett Jorgensen
Using a Bare-Metal-Boot Mode, these devices never have to touch the hard drive of the host machine, and with capacities up to 128GB, there is plenty of room for data storage as well. Add to that encryption and dual factor authentication and you’ve got an incredibly secure device...
May 25, 2011 Added by:Headlines
“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."
May 25, 2011 Added by:Headlines
“The survey shows that there is clearly room for improvement by the mobile operator community in addressing PCI DSS compliance, and it is critical that operators not yet compliant take appropriate measures to ensure the security of their customer’s sensitive cardholder data..."
May 22, 2011 Added by:Global Knowledge
Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...
May 19, 2011 Added by:Emmett Jorgensen
Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...
May 18, 2011 Added by:Robb Reck
By using a well-tested framework we can ensure that our organization’s security needs are adequately documented. The policies are critical, but they are only the framework. To flesh out the program we need the actual implementation, and that’s where the rest of the staff comes in...
May 17, 2011 Added by:Robert Siciliano
At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...
May 16, 2011 Added by:Headlines
"As of May 13, Sony was incomplete in exercising measures that they said they will do on the May 1 press conference," said Kazushige Nobutani, Japan's director of media and content in the country's Ministry of Economy, Trade, and Industry...
May 16, 2011 Added by:Rafal Los
The reality of the situation is that we don't have any good answers. I've been looking unsuccessfully for some type of guidance that doesn't rely on the underlying mobile OS to protect the application - but that's really a fool's errand anyway...
May 13, 2011 Added by:Headlines
The new authentication feature allows users the option of requiring that a one-time numeric authentication code be entered in addition to the standard username/password combination if the network detects a login attempt from a device that has not been previously saved by the user...
May 09, 2011 Added by:Headlines
The bill prohibits any engagements “to develop, design, plan, promulgate, implement or execute a bilateral policy, program, order, or contract of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company..."
Google Says It’s Not Practical to Fix Flaw... Mike Edison on 01-28-2015
Google Says It’s Not Practical to Fix Flaw... Eden Connie on 01-28-2015
Assessment of Visual Voicemail Security... Anoop birha on 01-28-2015