Latest Files for Download

452458456956503c70c1888ff7567b88

Data Privacy, Information Security and Cyber Insurance Trends Report 2013

January 29, 2013

This exclusive report has many well known top industry experts that have offered their their thoughts on what they think, feel and should happen in 2013 as it pertains to Data Privacy, Information Security and Cyber Insurance and what steps can be taken to mitigate risk...

Comments  (0)

8c989dc4fa2c14780c6e1b9bc7c6c5e6

Do Reverse Proxies Provide Real Security?

September 25, 2012

We used the OSSTMM 3 so we could measure the Attack Surface. Even though, measuring the Attack Surface with RAVs seems complicated at first, it is actually pretty straight-forward once you understand the concepts. The results of this research can be found in this paper...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Protecting Your Data With Integrated Security Controls

September 11, 2012

The modern enterprise requires a new defense paradigm to protect their business from security threats. Not perimeter-based, but data-centric, and that can readily combine key information from multiple critical security controls to easily identify risks and threats and protect critical infrastructure and sensitive data...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cybercrime Controls for the Enterprise

August 30, 2012

The majority of attacks that result data breaches are simply not that complex, relying on well-known, tried-and-true methods. Yet most organizations lack the time and expertise to develop the security content— the breach detection rules and configuration hardening policies for servers—that can deter attempts...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

New NIST Guidelines on Securing BIOS for Servers

August 24, 2012

The NIST is requesting comments on new draft guidelines for securing BIOS systems for server computers. BIOS Protection Guidelines for Servers is written for server developers and information system security professionals responsible for server security, secure boot processes and hardware security modules...

Comments  (0)

1a490136c27502563c62267354024cd5

Mobile Security: Surfing the Paradox

August 22, 2012

The basis of the paradox – how can a device that is so small, open, innovative, tactile, easy to use and readily available retain mass-market appeal while at the same time remaining secure? This is the challenge not just from a software or hardware perspective, but also a cultural one...

Comments  (0)

1a490136c27502563c62267354024cd5

Digital Apocalypse: The Artillery of Cyber War

August 16, 2012

The multidimensional characteristics of cyberspace have dissolved the boundaries between digital and physical security, facilitating attacks that have devastating impact to critical infrastructure, corporate and government assets. Cyberspace is now the digital frontier of choice for executing combat operations...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST: Updated Computer Security Incident Handling Guide

August 15, 2012

During the chaotic first minutes when a computer system is under attack, having a well-prepared incident response plan to follow ensures that steps occur in the correct order. The revised NIST guide provides instructions for new or well-established incident response teams to create a proper policy and plan...

Comments  (0)

800ca77bf7ad76b2a830356569e524b7

How to Fight and Win the New Cyberwar

August 13, 2012

We are losing the cyberwar. What we are doing now not won't work and can't work because the net-centric defense approach is fundamentally flawed. This presentation includes a history of the battlefield because it's important to understand how we got in this mess in order for us to craft an effective solution...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

ENISA Calls for Joint Effort to Protect Login Credentials

August 10, 2012

In the cyber world our identity is reflected by our usernames and passwords. For users, keeping passwords safe is vital to avoid security incidents. But online service providers who store usernames and passwords are expected to do the same. Problems arise when security is compromised at either end of the chain...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO: Federal Law and the Changing Technology Landscape

August 08, 2012

The federal government collects and uses personal information on individuals in increasingly sophisticated ways. While this enables federal agencies to carry out critical functions, the existing laws for protecting individuals’ personal information may no longer be sufficient given current practices...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

What You Should Know When Choosing a FIM Solution

August 07, 2012

Before selecting a file integrity monitoring (FIM) solution, organizations must understand the technical differences between agentless and agent-based FIM. It’s actually these differences that deliver the benefits organizations want from their file integrity monitoring solution while minimizing the issues...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Guide to Intrusion Detection and Prevention Systems

August 02, 2012

This publication describes the characteristics of IDPS technologies and provides recommendations for designing, implementing, configuring, securing, monitoring, and maintaining them. The types of IDPS technologies are differentiated by the events that they monitor and the ways in which they are deployed...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Draft Guide to Malware Incident Prevention and Handling

July 31, 2012

This publication provides recommendations for improving an organization’s malware incident prevention measures. It also gives extensive recommendations for enhancing an organization’s existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Cyber Intelligence and Open Source Techniques

July 23, 2012

The National Counterintelligence Executive states that counterintelligence plays a critical role in reversing the benefits that cyber operations afford our adversaries. Cyber intelligence collection and analysis increases our understanding of the adversary and how to defend against them...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Full Analysis of the FFIEC Statement on Cloud Computing

July 22, 2012

"The FFIEC Agencies consider cloud computing to be another form of outsourcing with the same basic risk characteristics and risk management requirements as traditional forms of outsourcing". Whether you believe it or not, this is the stake in the ground for the FFIEC...

Comments  (0)


« < | 1 - 2 - 3 - 4 - 5 | > »