Security Management

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (10)

E595c1d49bf4a26f8e14ce59812af80e

Will Network Security Concerns Sink Government BYOD?

June 11, 2014 Added by:Patrick Oliver Graf

Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: It's Us vs. Them - Or is it?

June 10, 2014 Added by:Tripwire Inc

The fact is most reported breaches are not caused by elegant external attacks. They are caused by careless employees who click the link before they think, despite our best efforts to make them aware of risks and train them in security basics.

Comments  (1)

F5b1211c3952ce30f829cd3c757a1a7f

Was Steve Jobs Wrong About Product Design?

June 10, 2014 Added by:Ali Golshan

It is not a question of if we should listen to customers, rather what we should or must listen to customers for, and how we listen.

Comments  (1)

93c815429fc1ab15a9295a4f55989ae0

Signatures of PINS? EMV is Coming

June 09, 2014 Added by:Neohapsis

Ultimately, whether cards are authenticated via PIN or signature, the chip-based credit cards being rolled out in the U.S. will rely upon EMV security measures to protect the security of credit card data.

Comments  (1)

219bfe49c4e7e1a3760f307bfecb9954

Software Security: An Imperative to Change

June 05, 2014 Added by:Rohit Sethi

Attention-grabbing exploits are becoming the norm. We hear about bugs like Heartbleed and IE 0days almost every week. Understandably the public is concerned about insecure technology. Yet for those of us who work in information security, this isn’t news at all. We have long known that insecure software is the root cause of most breaches.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Why the Bridge Still Needs to be Built Between Operations and IT

June 04, 2014 Added by:Joe Weiss

When people complain that operators are too focused on safety and reliability I don’t know whether to laugh or cry.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

U.S. Agencies Need to Improve Cyber Incident Response Practices

June 04, 2014 Added by:Stefano Mele

The U.S. Government Accountability Office (GAO) found that twenty-four major federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a security breach of a computerized system and information).

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Lessons from Snapchat

June 03, 2014 Added by:Rebecca Herold

Oh, you’ve not heard yet? Or, you heard something about Snapchat but thought it was all about teens taking risqué photos that were then captured by screen shots?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Want Some More Bad News?

June 02, 2014 Added by:Wendy Nather

If so much of security relies on a contest of knowledge, then it's no wonder that so much of what we build turns into wet Kleenex at the drop of a (black) hat.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Effectively Communicating Attack Surface Analytics

June 02, 2014 Added by:Tripwire Inc

Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

As Security Technology Evolves…So Must We

May 28, 2014 Added by:Ali Golshan

Regardless of how automated as threat defense becomes, it is one area of security where people will never be automated out of a job. In fact, quite the opposite.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

"Back to Basics": What does this mean?

May 28, 2014 Added by:Dave Shackleford

So what ARE “the very basics”? And how exactly do we “get back to them”?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vigilance: Maintaining an Effective Enterprise Security Posture

May 27, 2014 Added by:Tripwire Inc

So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?

Comments  (0)

Fafdf1720f4df1d41c6eacbd2429a06b

Windows Update to Fix Pass-the-Hash Vulnerability? Not!

May 27, 2014 Added by:Tal Be'ery

Exploiting the Pass-the-Hash vulnerability is the weapon of choice for most APT attackers. Therefore when Microsoft released a Windows’ update on May 13th titled: “Update to fix the Pass-The-Hash Vulnerability”, it was warmly accepted by IT teams. However, this update was received by the security community with a raised eyebrow, especially due to the fact that just two months before the upd...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »