Items Tagged with "Security"


4ff49873e3fed9a24adf0d37ae00b780

Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Game Over: Cloud Computing and the Sony Breach

June 02, 2011 Added by:Kelly Colgan

We often use words like “robust,” “comprehensive,” and “strong” to describe security programs. Nice as that may sound, security isn’t only the strength of a system, but about the mindset of the people working it. Have they asked all the questions? Have they covered all their bases?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Summit Seeks Global Cybersecurity Collaboration

June 02, 2011 Added by:Headlines

“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way. Cybersecurity is now intertwined with international security, and you can't divorce it from that...”

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Return on Security Investment (ROSI) Calculator Launched

June 02, 2011 Added by:Dejan Kosutic

This is the most detailed ROSI Calculator that can be found on the Internet, and it aims to calculate as precisely as possible whether the potential decrease of security incidents (i.e. the risk mitigation) will outweigh the investment in security measures. It's completely free...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Ten Steps To A More Secure Password

May 31, 2011 Added by:Global Knowledge

I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...

Comments  (2)

69fd9498e442aafd4eb04dfdfdf245c6

Freedom versus Security

May 31, 2011 Added by:Luis Corrons

In a few years’ time, besides protecting ourselves against cyber-attacks we will also have to look for mechanisms that guarantee our rights against government abuse of power. Some people are talking about the introduction of “Internet passports” to identify Internet users...

Comments  (3)

A966b1b38ca147f3e9a60890030926c9

Security and Due Diligence

May 28, 2011 Added by:Chris Blask

Behind all the technology and corporations and globe-spanning markets and networks there are individual human beings. The actions and intent of those individuals shines through the layers between them and the rest of us like arc lights through kleenex. There is no replacement for intent...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The Future of Secure Mobile Computing?

May 27, 2011 Added by:Emmett Jorgensen

Using a Bare-Metal-Boot Mode, these devices never have to touch the hard drive of the host machine, and with capacities up to 128GB, there is plenty of room for data storage as well. Add to that encryption and dual factor authentication and you’ve got an incredibly secure device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Spammers Creating Fake URL Shorteners

May 25, 2011 Added by:Headlines

“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mobile Network Operators Lack PCI DSS Compliance

May 25, 2011 Added by:Headlines

“The survey shows that there is clearly room for improvement by the mobile operator community in addressing PCI DSS compliance, and it is critical that operators not yet compliant take appropriate measures to ensure the security of their customer’s sensitive cardholder data..."

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The Top Eleven IT Skills for 2011

May 22, 2011 Added by:Global Knowledge

Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Convenience or Security?

May 19, 2011 Added by:Emmett Jorgensen

Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Every Employee is a Security Partner

May 18, 2011 Added by:Robb Reck

By using a well-tested framework we can ensure that our organization’s security needs are adequately documented. The policies are critical, but they are only the framework. To flesh out the program we need the actual implementation, and that’s where the rest of the staff comes in...

Comments  (4)

37d5f81e2277051bc17116221040d51c

Top Five Business Security Risks

May 17, 2011 Added by:Robert Siciliano

At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Japan Says 'No' to Sony PlayStation Network Relaunch

May 16, 2011 Added by:Headlines

"As of May 13, Sony was incomplete in exercising measures that they said they will do on the May 1 press conference," said Kazushige Nobutani, Japan's director of media and content in the country's Ministry of Economy, Trade, and Industry...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security on Mobile Payment Terminals via Consumer Devices

May 16, 2011 Added by:Rafal Los

The reality of the situation is that we don't have any good answers. I've been looking unsuccessfully for some type of guidance that doesn't rely on the underlying mobile OS to protect the application - but that's really a fool's errand anyway...

Comments  (1)

Page « < 12 - 13 - 14 - 15 - 16 > »