Vulns & Alerts

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Tricky Game of Breach Notification

July 16, 2013 Added by:Rafal Los

I received an email today from a vendor I use regularly, notifying me that there had been “unauthorized access attempts” to their web platform against a small pool of accounts.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Subtleties of Enterprise Security Vulnerability Management — at Scale

July 11, 2013 Added by:Rafal Los

Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Addressing the Open Doors in Your APT Strategy

July 10, 2013 Added by:InfosecIsland News

With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits. (Re...

Comments  (0)

306708aaf995cf6a77d3083885b60907

Iowa Mental Health Institute Warns of Missing Backup Tape

June 26, 2013 Added by:Mike Lennon

The Iowa Department of Human Services on Wednesday warned former patients at the Mental Health Institute in Independence and others, about a possible breach of their confidential information due to a lost backup tape.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Another Reason Hacking Back is Probably a Bad Idea

June 20, 2013 Added by:Rafal Los

Private industry and corporations alike are talking about “hack-back.” It’s no secret I believe that “hack-back” is a bad idea, for many reasons.

Comments  (3)

F2792196079f2c16cd02be6e9ff5b3da

Why are Cybercrimes NOT Always White-collar Crimes?

June 17, 2013 Added by:DHANANJAY ROKDE

A generic definition of a crime would be an act that is in violation of the applicable laws.

Comments  (0)

1de705dde1cf97450678321cd77853d9

Scangate Re-visited: Vulnerability Scanners Uncovered

June 12, 2013 Added by:Ian Tibble

The notion that VA tools really can be used to give a decent picture of vulnerability is still heavily embedded, and that notion in itself presents a serious vulnerability for businesses.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Into the Breach

April 16, 2013 Added by:Allan Pratt, MBA

One day, you come into the office and discover that your network has been breached. To make matters worse, your customer data has been stolen. What do you do?

Comments  (0)

36317a78f97d1d6d7a02333ad01186fa

New Approaches for Blocking Zero-Day Exploits to Prevent APTs

April 16, 2013 Added by:George Tubin

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation.

Comments  (1)

F66c1a87a8db2cb584b4e06e93a84ce3

Attack Vector Undefined: Dismantling ‘Defense in Depth’ through Power Grid.

April 12, 2013 Added by:Mikko Jakonen

Well, before COTS (Commercial Off The Shelve) came popular in military and other organizations thinking their security, this could have been avoided. Nowadays, very difficult. Even in trailers. You still need only one computer making possible to interact with others – in many different NETs existing :)

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Making Patching Work for SCADA and Industrial Control System Security

April 05, 2013 Added by:Eric Byres

Applying patches is a critical part of good security. According to US-CERT, about 95% of all network intrusions could have been avoided by keeping systems up to date with appropriate patches. What I am against is patching as a knee-jerk reaction to security vulnerabilities. You can’t expect your control system to operate reliably if you don’t have a controlled process for patching.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

MongoDB Remote Command Execution Vulnerability: Nightmare or Eye-Opener?

April 03, 2013 Added by:Rohit Sethi

The March 24th public disclosure of a MongoDB zero-day vulnerability (CVE-2013-1892) has been raising eyebrows and initiating discussion among IT security and developers alike. Here’s why we think it stands out...

Comments  (0)

Default-avatar

New Malware Targets POS Systems and ATMs, Hits Major US Banks

March 27, 2013 Added by:Infosec Island

A new malware targeting point-of-sale (POS) systems and ATMs has stolen payment card information from several US banks, researchers say. The author behind the malware appears to have links to a Russian cyber-crime gang.

Comments  (0)

1de705dde1cf97450678321cd77853d9

Hardening Is Hard If You're Doing It Right

March 20, 2013 Added by:Ian Tibble

The early days of deciding what to do with the risk will be slow and difficult and there might even be some feisty exchanges, but eventually, addressing the risk becomes a mature, documented process that almost melts into the background hum of the machinery of a business.

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »