Network->General

A70a600d7c593ca50cc6639cd64ed71a

Threat Intelligence: A Force Multiplier for Security Pros

March 26, 2015 Added by:Joseph Pizzo

With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.

Comments  (0)

60dcc0d0012f3056175c01d54c2e1722

Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security

March 26, 2015 Added by:Kevin Watson

The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.

Comments  (0)

0ead717779244d9aab5c1699308850d2

China Named Top Originator of Attack Traffic in Q4 2014: Akamai

March 26, 2015 Added by:Brian Prince

A new report from Akamai Technologies names China as the top source of attack traffic on the Web.

Comments  (0)

B359c06abd8c84e1a224a96ca47af8b9

Understanding Internet Protocol Security (IPsec)

March 25, 2015 Added by:Barracuda Networks

IPSEC is the most popular form of VPN used today. It is important to understand how IPSEC works in order to trouble shoot issues with IPSEC tunnels.

Comments  (3)

6d117b57d55f63febe392e40a478011f

CSIS Issues Recommendations for Threat Intelligence Sharing

March 25, 2015 Added by:Anthony M. Freed

The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.

Comments  (6)

Af7244bb99debb4a1152fa49a993a05c

Air-Gapped Computers Can Communicate Through Heat: Researchers

March 24, 2015 Added by:Eduard Kovacs

Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.

Comments  (9)

Bd07d58f0d31d48d3764821d109bf165

Stop Relying on IP-based Security Before My Coffee Maker is Hit by a DDoS Attack

March 23, 2015 Added by:Tripwire Inc

Last week, the Internet fell over itself to report on a botnet allegedly comprised of 100,000 smart devices. Things. The Internet of Things had finally attacked!

Comments  (3)

D36d0936f0c839be7bf2b20d59eaa76d

Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (4)

Bd07d58f0d31d48d3764821d109bf165

Taking Advantage of Critical Infrastructure Cybersecurity

March 18, 2015 Added by:Tripwire Inc

A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Retail and Financial Services Sectors Wary of Insider Threats

March 18, 2015 Added by:Anthony M. Freed

The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.

Comments  (1)

B689dd1362bef7eb372a540d3b6e6287

6 Architecture Considerations When Deploying PAM

March 17, 2015 Added by:Identropy

Designing a PAM archetecture for your organization will be an iterative process. Expect to repeat conversations as more factors and perspectives are brought into the conversation.

Comments  (8)

Af2c9843333cc1e2578ddf18b3eed066

Lessons From Hillary Clinton's Email Security Oversight

March 16, 2015 Added by:Peter Zavlaris

Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.

Comments  (8)

Af2c9843333cc1e2578ddf18b3eed066

The Battle Has Moved to the Endpoints and Beyond

March 11, 2015 Added by:Peter Zavlaris

While organizations may be adding solutions to their arsenals to combat threats at the endpoint, they may want to consider what else constitutes their perimeter.

Comments  (6)

6d117b57d55f63febe392e40a478011f

Public Sector Increasingly Targeted by Powerful DDoS Attacks

March 11, 2015 Added by:Anthony M. Freed

The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.

Comments  (11)

Af7244bb99debb4a1152fa49a993a05c

Seagate Downplays Risks Posed by Business NAS Flaws

March 11, 2015 Added by:Eduard Kovacs

Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

Now That We Have All That Data What Do We Do, Revisited

March 11, 2015 Added by:Anton Chuvakin

We have SO much security data, how do we make sense of it?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »