Security Management


Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease?

April 01, 2014 Added by:Tal Be'ery

One of the new security features in the latest Windows release (Windows 8.1) is the “Restricted Admin mode for Remote Desktop Connection”. This measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket. However, it appears that cure might be worse than the disease as the new “Restricted Admin mode” opens a new attack surface for the...

Comments  (0)


Full Disclosure: The Rebirth

March 31, 2014 Added by:Tripwire Inc

Today, Full Disclosure is alive again, the advisories are flowing, the banter is cheerful, and the trolling has already started.

Comments  (0)


Reforming Terms of Service: Microsoft Changes Its Policy on Access to User Data

March 31, 2014 Added by:Electronic Frontier Foundation

We commend Microsoft for its willingness to reconsider its policies, and we think it made the right decision.

Comments  (0)


Be Wary: Hackers are Readying Security Updates for XP Users

March 27, 2014 Added by:Tripwire Inc

Approximately 40% of PC users still run desktop versions of Windows XP as well. Windows XP has been regarded by many as the best version of Windows ever.

Comments  (0)


When Security Tools Cry Wolf

March 27, 2014 Added by:Ken Westin

With the rising number and complexity of security tools at our fingertips, sometimes everything looks like an alert so nothing becomes actionable.

Comments  (0)


The Power of Change

March 26, 2014 Added by:Wendy Nather

I believe that most of security relies on detecting and controlling change. And there are so many aspects to change that have to be considered.

Comments  (0)


How to Use Threat Intelligence with Your SIEM?

March 26, 2014 Added by:Anton Chuvakin

SIEM and Threat Intelligence (TI) feeds are a marriage made in heaven! Indeed, every SIEM user should send technical TI feeds into their SIEM tool.

Comments  (0)


Will the Demise of XP Shut Down Your Business…or Heart?

March 25, 2014 Added by:Rebecca Herold

According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.

Comments  (0)


Microsoft Says: Come Back with a Warrant, Unless You’re Microsoft

March 24, 2014 Added by:Electronic Frontier Foundation

The search in the Kibkalo case may have revealed criminal activity, but it was also conducted in Microsoft’s self-interest, which is an exceedingly dangerous precedent.

Comments  (0)


Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)


BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)


On Internally-sourced Threat Intelligence

March 20, 2014 Added by:Anton Chuvakin

At the very top of the very top of the pyramid...sit organizations that produce their own threat intelligence (TI), sourced from local artifacts and their own intelligence gathering activities.

Comments  (0)


System Hardening: Defend Like An Attacker

March 18, 2014 Added by:Tripwire Inc

Defenders also need to think like attackers. Easier said than done.

Comments  (0)


The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)


Delving into Threat Actor Profiles

March 17, 2014 Added by:Anton Chuvakin

Threat actor profiles can be used by a fledgling threat intelligence operation to organize their knowledge about who is “out to get them” and who they observe on their network. Such knowledge organization helps prioritize incident response and alert triage activities.

Comments  (0)


Target Should be Our Target

March 14, 2014 Added by:Wayde York

The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »