Items Tagged with "Network Security"


52ff7cf6fd88aebfb48b323e6251cd95

The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)

673de21f2652135087d940b7f65c4b5e

The Five Things CSOs Need to Know About Software-Defined Security

January 19, 2015 Added by:Carson Sweet

Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.

Comments  (2)

6ee5846e0a227db0333ff7c99ff61313

When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Encryption: The Key to Network Security

December 05, 2013 Added by:Patrick Oliver Graf

The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Vehicle VPNs, Part Two: Business World Implications

November 05, 2013 Added by:Patrick Oliver Graf

Using a VPN to secure your car is no different than using one to safeguard the connections initiated from your smartphone or tablet. Any device, as small as an iPhone or as large as an SUV, should be equipped with the best security features before remotely accessing a corporate network.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

There is no Onion - The Painful Reality of Defense in Depth

June 26, 2013 Added by:Rafal Los

Imagine if you woke up tomorrow morning and it was conclusively proven that the layered onion model was proven to fail in several circumstances commonly deployed and used in today’s enterprise. That would sure explain much of the failure we’ve seen across enterprise breaches, wouldn’t it?

Comments  (0)

890b3a52d134186c048e1d845daae070

From the SMB to Security Guru: Five Ways IT Pros Can Manage Security on a Budget

June 14, 2013 Added by:Vinod Mohan

Given the expanding threat landscape for the SMB and the increased demand for affordable IT security tools, here are five valuable tips for IT pros that help shed light on managing enterprise security on a budget.

Comments  (0)

Default-avatar

Network Security Dark Space: What You Don’t Know Can Hurt You

February 11, 2013 Added by:Infosec Island

Dark space is everywhere – it’s a major challenge to security teams everywhere. The good news is the problem can be solved, and complete coverage can be achieved.

Comments  (2)

Default-avatar

UPnP Security Flaws Expose 40-50 Million Networked Devices

January 29, 2013 Added by:Infosec Island

Researchers at Rapid7 have uncovered that roughly 40-50 million network-enabled devices are at risk due to vulnerabilities in the Universal Plug and Play (UPnP) protocol.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Surface Mapping Pays Off

January 29, 2013 Added by:Brent Huston

You have heard us talk about surface mapping applications during an assessment before. You have likely even seen some of our talks about surface mapping networks as a part of the 80/20 Rule of InfoSec. But, we wanted to discuss how that same technique extends into the physical world as well....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Rise of Exploit Kits According to Solutionary SERT

January 28, 2013 Added by:Pierluigi Paganini

The report revealed the surprising efficiency of well-known vulnerabilities usually included in the popular exploits sold in the underground, around 60% are more than two years old, and 70% of the exploit kits analyzed (26) were released or created in Russia...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Three Tips for Effective Vulnerability Assessments

January 23, 2013 Added by:Dan Dieterle

Regular vulnerability assessments are essential because threats to your network security continually change and evolve, and your security should be able to match this. A user’s PC or network access point might be secure today, but it could become completely vulnerable tomorrow...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

Panetta is Critical of the Security Level on NATO Networks

January 23, 2013 Added by:Pierluigi Paganini

The Atlantic Council website has published excerpts of remarks by Secretary of Defense Leon Panetta on the inability of NATO networks to repel cyber threats. According the officials, the situation appears to be critical in both the private and public sectors, and it is also very concerning for military environments...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

ESB Security Spotlighted At ZeroNights 2012

December 25, 2012 Added by:Alexander Polyakov

ERP systems, which store the information about finances, employees, materials, wages, and so on, are rightfully considered to be the most critical of such systems. Unauthorized access to those systems can lead to espionage, sabotage, or fraud...

Comments  (0)

1de705dde1cf97450678321cd77853d9

Migrating South: The Devolution Of Security From Security

December 20, 2012 Added by:Ian Tibble

Is the typical security portfolio of system administrators wide enough to form the foundations of an effective information security program? Not really. In fact its some way short. Security Analysts need to have a grasp not only on file system permissions, they need to know how attackers actually elevate privileges...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »