Security Management

Ebb72d4bfba370aecb29bc7519c9dac2

On MSSP SLAs

October 28, 2014 Added by:Anton Chuvakin

SLAs play a role here as well, and – you guessed it – what you need here also depends on the maturity of your change management processes.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Distinguishing Acts of War in Cyberspace

October 27, 2014 Added by:Stefano Mele

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: How Gaps In SSH Security Create an Open Door for Attackers

October 27, 2014 Added by:InfosecIsland News

Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cyber Security Careers: What You Need To Know To Advance In The Security Field

October 23, 2014 Added by:Tripwire Inc

Skilled people make the difference in protecting sensitive data, so it’s more critical than ever that public and private sectors begin training and hiring cyber security professionals.

Comments  (1)

65be44ae7088566069cc3bef454174a7

6 Actions Businesses Should Take During Cyber Security Awareness Month

October 22, 2014 Added by:Rebecca Herold

October is National Cyber Security Awareness Month. It would seem the breaches announced virtually every day of this month so far were orchestrated to highlight the need for organizations to beef up their information security efforts and improve their controls.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Acting on MSSP Alerts

October 16, 2014 Added by:Anton Chuvakin

Security incidents call for an immediate incident response (by definition), while alerts need to be reviewed via an alert triage process in order to decide whether they indicate an incident, a minor “trouble” to be resolved immediately, a false alarm or a cause to change the alerting rules in order to not see it ever again.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Introducing the Shoulders of InfoSec Project

October 15, 2014 Added by:Jack Daniel

In information security we have a very bad habit of ignoring the past; many times it isn’t even a failure to remember, it is a failure to ever have known who and what came before.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Do Not Jump To Conclusions

October 08, 2014 Added by:PCI Guru

The take away from this post is to think through the implications of the Council’s directives before you go off advising organizations that certain technologies are not PCI compliant

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Shellshock(ed)? How Did Your Security Program Do?

October 07, 2014 Added by:Tripwire Inc

All we should hear from security professionals is glee as their well-oiled machines switch into gear and they get to prove that they are able to operate at times when mere mortals quake in fear. For many though this is not the reality.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Critical Vulnerability Kills Again!!!

October 06, 2014 Added by:Anton Chuvakin

Do not make your security architecture solely reliant on patching. Big vulnerabilities will happen and so will zero-days, so make sure that your entire security architecture does not crumble if there is one critical vulnerability: do defense in depth, layers, “least privilege”, controls not reliant on updates, monitoring, deception, etc.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Accepting Identity Theft

October 06, 2014 Added by:Brent Huston

I can recall a time when I wasn’t concerned about data theft. Eventually, buzz words such as “breach” and “identity theft” became a regular part of my vocabulary.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Five Anti-Analysis Tricks That Sometimes Fool Analysts

October 02, 2014 Added by:Malwarebytes

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Data Privacy Smoke and Mirrors

October 01, 2014 Added by:Dan Dieterle

As hardware and software manufacturers make public statements about hardening and protecting their services in the name of customer privacy, federal agencies speak out against it – let the smoke and mirrors game begin…

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security - Hackable Even When It's Secure

October 01, 2014 Added by:Rafal Los

On a recent call, one of the smartest technical folks I can name said something that made me reach for a notepad, to take the idea down for further development later. He was talking about why some of the systems enterprises believe are secure really aren't, even if they've managed to avoid some of the key issues.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Find Security That Oursources Badly!

September 29, 2014 Added by:Anton Chuvakin

In this post, I wanted to touch on a sensitive topic: what security capabilities outsource badly?

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »