SCADA

B359c06abd8c84e1a224a96ca47af8b9

PCI DSS 3.0 Updates and Ramifications for Network and Application Security

March 02, 2015 Added by:Barracuda Networks

The PCI DSS 3.0 is here. Since Jan 1, 2015 organizations under its purview are required to comply with the updated standard. Many of the changes stem from the recent high profile breaches, despite being compliant.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Is Visual Hacking Undermining Your Enterprise Security?

March 02, 2015 Added by:Anthony M. Freed

A new study conducted by the Ponemon Institute reveals how easy it is to undermine enterprise security with low-tech visual hacking operations, where nine out of every ten attempts (88%) were found to be successful.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

SIEM/DLP Add-on Brain?

March 02, 2015 Added by:Anton Chuvakin

The good news is that we now a decent number of vendors that offer, essentially, an add-on brain for your SIEM. Some can also add a brain to your DLP, since it turned out that DLP is pretty brainless as well…

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Prohibiting RC4 Cipher Suites

February 26, 2015 Added by:Tripwire Inc

I’ve long believed that RC4 was dead based on past research and multiple vendors have already declared it dead.

Comments  (13)

E595c1d49bf4a26f8e14ce59812af80e

Open Haus: Wi-Fi and Seamless Roaming for Mobile Workers

February 26, 2015 Added by:Patrick Oliver Graf

Whatever you picture, the fact is that mobility is now a key expectation of many employees. Those who work from laptops, tablets and other mobile devices need to be certain that the technology they depend on is able to follow them from place to place, without any service interruption.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Keep Your Hands Off My SSL Traffic

February 25, 2015 Added by:Brent Huston

If you have been living under an online rock these last couple of weeks, then you might have missed all of the news and hype about the threats to your SSL traffic.

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

The Trouble with (Asset) Identity

February 24, 2015 Added by:Tripwire Inc

Have you ever had your identity stolen? Or perhaps an identity crisis? I hope for your sake the answer is “no.” However, if it’s yes, you are in good company.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Perceptive Privacy Protectors Push for IoT Privacy Protections

February 23, 2015 Added by:Rebecca Herold

The costs of implementing security safeguards and privacy controls are significantly less than the costs, and damage to individuals’ lives, of cleaning up and paying all the associated money and time for security incidents and privacy breaches.

Comments  (0)

0ead717779244d9aab5c1699308850d2

DDoS-for-Hire Services Cheap But Effective

February 19, 2015 Added by:Brian Prince

Distributed denial-of-service attackers are making it relatively cheap to disrupt targeted sites, according to a new report from Verisign.

Comments  (8)

E595c1d49bf4a26f8e14ce59812af80e

How to Manage Secure Communications in M2M Environments

February 18, 2015 Added by:Patrick Oliver Graf

For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices around every corner.

Comments  (1)

8c9639c5e1594aa583549790333cd451

The Year of Threat Intelligence Sharing: Bringing Structure to the Chaos of Big Security Data

February 18, 2015 Added by:Robert McNutt

While no one has a crystal ball to peer in and see what 2015’s landscape will look like, one thing is for sure: hackers are becoming more sophisticated and in order to stave off data breaches, we need to be aggregating and sharing information.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Many IT Pros Ignore Security Policy in Order to Do Their Jobs: Survey

February 17, 2015 Added by:Brian Prince

According to a survey of 1,000 consumers by ResearchNow, a third of the IT professionals and administrators said they had downloaded an application they were not authorized to use on a corporate device in order to do their job.

Comments  (8)

6d117b57d55f63febe392e40a478011f

ISACA Addresses IoT Risk Management

February 17, 2015 Added by:Anthony M. Freed

ISACA has released a new guide for organizations concerned about the impact of The Internet of Everything (IOT) on business operations, addressing the potential value and the associated risks involved with expanded connectivity.

Comments  (1)

0ead717779244d9aab5c1699308850d2

PoS Malware Kits Rose in Underground in 2014: Report

February 12, 2015 Added by:Brian Prince

In 2014, while several major companies were coping with breaches of their PoS infrastructure, many smaller retailers were facing the same threat from less-organized groups.

Comments  (5)

507c8b7b935d89fb00bab0609b37de42

Poor SIEM – Why Do We Doom You to Fail?

February 10, 2015 Added by:Robert Eslinger

Some say the current SIEM status quo provides no value and must evolve if it’s to survive. But I believe these views stem from a fundamental misunderstanding of what SIEM does (or should do).

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Analytics Lessons Learned — and Ignored!

February 10, 2015 Added by:Anton Chuvakin

As I was finishing the most excellent book “Data-Driven Security: Analysis, Visualization and Dashboards“ (see book site also), one paragraph jumped out and bit me in the face – ouch!

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »