June 02, 2014 Added by:Joe Weiss
It's official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta.
May 29, 2014 Added by:Dan Dieterle
People trust and share way too much on social media sites, and unfortunately this extends to government employees and military troops around the world.
May 27, 2014 Added by:Tripwire Inc
So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?
May 22, 2014 Added by:Rob Fuller
Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which is not always easy to crack) or assume administrative access (because they attempt to PSEXEC with the incoming session). Well, since MS08-068 that's much harder to pin down.
May 21, 2014 Added by:Joe Weiss
Stuxnet and Aurora utilized design features of the system or controllers to attack physical systems. Stuxnet and Aurora are not traditional network vulnerabilities and cannot be found or mitigated by using traditional IT security techniques.
May 20, 2014 Added by:Electronic Frontier Foundation
Here's how the House version of the USA Freedom Act compares to the Senate's version, what the new House version of the USA Freedom Act does, and what it sorely lacks.
May 13, 2014 Added by:Tripwire Inc
What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.
May 12, 2014 Added by:Anthony M. Freed
Though the threat has been recognized in theory for some time, researchers have now found direct evidence that bogus digital certificates not issued and authorized by legitimate site owners have been employed in establishing seemingly secure HTTPS connections.
May 06, 2014 Added by:Joe Weiss
DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.
April 28, 2014 Added by:InfosecIsland News
SecurityWeek announced that it has acquired the ICS Cybersecurity Conference series, the leading organizer of cybersecurity-focused events for the industrial control systems sector.
April 28, 2014 Added by:Rebecca Herold
Here are the most common questions, and associated answers, that I’ve received from several of my small- to midsized clients about Heartbleed that have involved the most confusion; let’s clear up that misunderstanding!
April 24, 2014 Added by:John Grady
The first step is to think strategically, which means creating policies and procedures aimed at the enterprise network as a whole rather than handling issues case by case.
April 21, 2014 Added by:Dan Dieterle
You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the latest modules from Metasploit you can quickly see the exploit in action.
April 21, 2014 Added by:Tripwire Inc
Put simply, your attack surface is the sum of your security risk exposure. Put another way, it is the aggregate of all known, unknown and potential vulnerabilities and controls across all software, hardware, firmware and networks.
Wanna Buy Some Dumps?... Xenon Jur on 08-21-2014
The Benefits of FUD... willy ben on 08-21-2014
Mobile Security: Tips for Using Personal Dev... sikawai duluan on 08-20-2014