Items Tagged with "Network Security"


E595c1d49bf4a26f8e14ce59812af80e

Encryption: The Key to Network Security

December 05, 2013 Added by:Patrick Oliver Graf

The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Vehicle VPNs, Part Two: Business World Implications

November 05, 2013 Added by:Patrick Oliver Graf

Using a VPN to secure your car is no different than using one to safeguard the connections initiated from your smartphone or tablet. Any device, as small as an iPhone or as large as an SUV, should be equipped with the best security features before remotely accessing a corporate network.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

There is no Onion - The Painful Reality of Defense in Depth

June 26, 2013 Added by:Rafal Los

Imagine if you woke up tomorrow morning and it was conclusively proven that the layered onion model was proven to fail in several circumstances commonly deployed and used in today’s enterprise. That would sure explain much of the failure we’ve seen across enterprise breaches, wouldn’t it?

Comments  (0)

890b3a52d134186c048e1d845daae070

From the SMB to Security Guru: Five Ways IT Pros Can Manage Security on a Budget

June 14, 2013 Added by:Vinod Mohan

Given the expanding threat landscape for the SMB and the increased demand for affordable IT security tools, here are five valuable tips for IT pros that help shed light on managing enterprise security on a budget.

Comments  (0)

Default-avatar

Network Security Dark Space: What You Don’t Know Can Hurt You

February 11, 2013 Added by:Infosec Island

Dark space is everywhere – it’s a major challenge to security teams everywhere. The good news is the problem can be solved, and complete coverage can be achieved.

Comments  (0)

Default-avatar

UPnP Security Flaws Expose 40-50 Million Networked Devices

January 29, 2013 Added by:Infosec Island

Researchers at Rapid7 have uncovered that roughly 40-50 million network-enabled devices are at risk due to vulnerabilities in the Universal Plug and Play (UPnP) protocol.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Surface Mapping Pays Off

January 29, 2013 Added by:Brent Huston

You have heard us talk about surface mapping applications during an assessment before. You have likely even seen some of our talks about surface mapping networks as a part of the 80/20 Rule of InfoSec. But, we wanted to discuss how that same technique extends into the physical world as well....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Rise of Exploit Kits According to Solutionary SERT

January 28, 2013 Added by:Pierluigi Paganini

The report revealed the surprising efficiency of well-known vulnerabilities usually included in the popular exploits sold in the underground, around 60% are more than two years old, and 70% of the exploit kits analyzed (26) were released or created in Russia...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Three Tips for Effective Vulnerability Assessments

January 23, 2013 Added by:Dan Dieterle

Regular vulnerability assessments are essential because threats to your network security continually change and evolve, and your security should be able to match this. A user’s PC or network access point might be secure today, but it could become completely vulnerable tomorrow...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Panetta is Critical of the Security Level on NATO Networks

January 23, 2013 Added by:Pierluigi Paganini

The Atlantic Council website has published excerpts of remarks by Secretary of Defense Leon Panetta on the inability of NATO networks to repel cyber threats. According the officials, the situation appears to be critical in both the private and public sectors, and it is also very concerning for military environments...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

ESB Security Spotlighted At ZeroNights 2012

December 25, 2012 Added by:Alexander Polyakov

ERP systems, which store the information about finances, employees, materials, wages, and so on, are rightfully considered to be the most critical of such systems. Unauthorized access to those systems can lead to espionage, sabotage, or fraud...

Comments  (0)

1de705dde1cf97450678321cd77853d9

Migrating South: The Devolution Of Security From Security

December 20, 2012 Added by:Ian Tibble

Is the typical security portfolio of system administrators wide enough to form the foundations of an effective information security program? Not really. In fact its some way short. Security Analysts need to have a grasp not only on file system permissions, they need to know how attackers actually elevate privileges...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Ultra-Legacy Problem - Systems so old...

December 19, 2012 Added by:Rafal Los

Say you're a sizeable institution here and that over the last two decades you've amassed lots of platforms that run your business, in a time before the Information Security organization did much more than install anti-virus on your desktop... and now that technical debt has come back to haunt you...

Comments  (3)

54a9b7b662bfb0f0445d1661d7ed180b

Hackers at the Controls

December 16, 2012 Added by:Jayson Wylie

An FBI report details what could be the hacking elite sect of Anonymous, Antisec, using a backdoor to compromise an air-conditioning control system in New Jersey. This leaves me to the question of how vulnerable the government and private sectors are for these types of compromise...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Israel’s Cyber Defenses Protect Government Sites from 44 Million Attacks

December 11, 2012 Added by:Dan Dieterle

Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Managing the Social Impact of Least Privilege

December 10, 2012 Added by:Paul Kenyon

In organizations where IT policy hasn’t been enforced or where users expect to have full autonomy over PCs, the transition to least privilege desktops must be carefully planned, so the IT department doesn’t face a user revolt. Make sure to set users’ expectations accordingly...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »