Security Training

Bd07d58f0d31d48d3764821d109bf165

Cyber Security Careers: What You Need To Know To Advance In The Security Field

October 23, 2014 Added by:Tripwire Inc

Skilled people make the difference in protecting sensitive data, so it’s more critical than ever that public and private sectors begin training and hiring cyber security professionals.

Comments  (0)

65be44ae7088566069cc3bef454174a7

6 Actions Businesses Should Take During Cyber Security Awareness Month

October 22, 2014 Added by:Rebecca Herold

October is National Cyber Security Awareness Month. It would seem the breaches announced virtually every day of this month so far were orchestrated to highlight the need for organizations to beef up their information security efforts and improve their controls.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Acting on MSSP Alerts

October 16, 2014 Added by:Anton Chuvakin

Security incidents call for an immediate incident response (by definition), while alerts need to be reviewed via an alert triage process in order to decide whether they indicate an incident, a minor “trouble” to be resolved immediately, a false alarm or a cause to change the alerting rules in order to not see it ever again.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Introducing the Shoulders of InfoSec Project

October 15, 2014 Added by:Jack Daniel

In information security we have a very bad habit of ignoring the past; many times it isn’t even a failure to remember, it is a failure to ever have known who and what came before.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Do Not Jump To Conclusions

October 08, 2014 Added by:PCI Guru

The take away from this post is to think through the implications of the Council’s directives before you go off advising organizations that certain technologies are not PCI compliant

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Shellshock(ed)? How Did Your Security Program Do?

October 07, 2014 Added by:Tripwire Inc

All we should hear from security professionals is glee as their well-oiled machines switch into gear and they get to prove that they are able to operate at times when mere mortals quake in fear. For many though this is not the reality.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Critical Vulnerability Kills Again!!!

October 06, 2014 Added by:Anton Chuvakin

Do not make your security architecture solely reliant on patching. Big vulnerabilities will happen and so will zero-days, so make sure that your entire security architecture does not crumble if there is one critical vulnerability: do defense in depth, layers, “least privilege”, controls not reliant on updates, monitoring, deception, etc.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Accepting Identity Theft

October 06, 2014 Added by:Brent Huston

I can recall a time when I wasn’t concerned about data theft. Eventually, buzz words such as “breach” and “identity theft” became a regular part of my vocabulary.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Five Anti-Analysis Tricks That Sometimes Fool Analysts

October 02, 2014 Added by:Malwarebytes

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Data Privacy Smoke and Mirrors

October 01, 2014 Added by:Dan Dieterle

As hardware and software manufacturers make public statements about hardening and protecting their services in the name of customer privacy, federal agencies speak out against it – let the smoke and mirrors game begin…

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security - Hackable Even When It's Secure

October 01, 2014 Added by:Rafal Los

On a recent call, one of the smartest technical folks I can name said something that made me reach for a notepad, to take the idea down for further development later. He was talking about why some of the systems enterprises believe are secure really aren't, even if they've managed to avoid some of the key issues.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Find Security That Oursources Badly!

September 29, 2014 Added by:Anton Chuvakin

In this post, I wanted to touch on a sensitive topic: what security capabilities outsource badly?

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Industry 4.0: Flexible Production Needs Secure Networking

September 29, 2014 Added by:Patrick Oliver Graf

When IT departments are not consulted, gaps in network security could appear.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Goodwill Payment Vendor Breached for 18 months Undetected – Are You Surprised?

September 24, 2014 Added by:Tripwire Inc

You may find this surprising… 18 months is a year and a half of attackers wandering around, looting sensitive data while remaining undetected.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »