Network Security

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Quick and Easy Website Vulnerability Scans with OWASP-ZAP

June 05, 2014 Added by:Dan Dieterle

OWASP ZAP is a web application penetration testing tool that has some great features. It is a very easy to use scanner that allows you to do manual or automatic website security checks. In this tutorial we will learn how to use the automatic attack feature.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Effectively Communicating Attack Surface Analytics

June 02, 2014 Added by:Tripwire Inc

Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

2014 ICS Cyber Security Conference – Mark Your Calendar

June 02, 2014 Added by:Joe Weiss

It's official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Iranian Hackers Target US Military Personnel via Social Media

May 29, 2014 Added by:Dan Dieterle

People trust and share way too much on social media sites, and unfortunately this extends to government employees and military troops around the world.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

"Back to Basics": What does this mean?

May 28, 2014 Added by:Dave Shackleford

So what ARE “the very basics”? And how exactly do we “get back to them”?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vigilance: Maintaining an Effective Enterprise Security Posture

May 27, 2014 Added by:Tripwire Inc

So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Effective NTLM / SMB Relaying

May 22, 2014 Added by:Rob Fuller

Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which is not always easy to crack) or assume administrative access (because they attempt to PSEXEC with the incoming session). Well, since MS08-068 that's much harder to pin down.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Electric Industry Still Doesn't Understand What Sophisticated Attackers Are After

May 21, 2014 Added by:Joe Weiss

Stuxnet and Aurora utilized design features of the system or controllers to attack physical systems. Stuxnet and Aurora are not traditional network vulnerabilities and cannot be found or mitigated by using traditional IT security techniques.

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

A Deep Dive into the House's Version of Narrow NSA Reform: The New USA Freedom Act

May 20, 2014 Added by:Electronic Frontier Foundation

Here's how the House version of the USA Freedom Act compares to the Senate's version, what the new House version of the USA Freedom Act does, and what it sorely lacks.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

Advanced Cyber Threat Techniques

May 19, 2014 Added by:Ali Golshan

Security can no longer be a bolted on solution to the existing infrastructure - it needs to start integrating with the mesh of the existing infrastructure.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Proactively Hardening Systems Against Intrusion: Configuration Hardening

May 13, 2014 Added by:Tripwire Inc

What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Researchers Find Evidence of Bogus Certs Used in HTTPS Connections

May 12, 2014 Added by:Anthony M. Freed

Though the threat has been recognized in theory for some time, researchers have now found direct evidence that bogus digital certificates not issued and authorized by legitimate site owners have been employed in establishing seemingly secure HTTPS connections.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

DOE Cyber Security Procurement Language – Is It Comprehensive Enough

May 06, 2014 Added by:Joe Weiss

DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Acquires Industrial Control System Cybersecurity Conference Series

April 28, 2014 Added by:InfosecIsland News

SecurityWeek announced that it has acquired the ICS Cybersecurity Conference series, the leading organizer of cybersecurity-focused events for the industrial control systems sector.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Heartbleed Facts and Fictions

April 28, 2014 Added by:Rebecca Herold

Here are the most common questions, and associated answers, that I’ve received from several of my small- to midsized clients about Heartbleed that have involved the most confusion; let’s clear up that misunderstanding!

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »