Items Tagged with "Security"


32137b352537f11c1efe063869f00e0e

Your Weekend Security Challenge: Password-Style

April 12, 2013 Added by:Le Grecs

Password managers will automatically fill in usernames and passwords as your target surfs around the web doing their usual things. I’ve found they just love this convenience and it serves as a great motivator for them to continue using it.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

April 09, 2013 Added by:Ben Rothke

In Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, authors Eric Knapp and Raj Samani provide and excellent overview on what the smart grid is and how it can be secured.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Enter the CISO: Torchbearer of Security and Risk Management

April 06, 2013 Added by:Anthony M. Freed

In a convergence culture, accountability for risk is accepted across the organization, and when that happens, risk management becomes a priority to the business, informing strategy and objectives. By helping identify and mitigate risk across finance, operations and IT, the CISO puts security in context of what could affect profit.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Making Patching Work for SCADA and Industrial Control System Security

April 05, 2013 Added by:Eric Byres

Applying patches is a critical part of good security. According to US-CERT, about 95% of all network intrusions could have been avoided by keeping systems up to date with appropriate patches. What I am against is patching as a knee-jerk reaction to security vulnerabilities. You can’t expect your control system to operate reliably if you don’t have a controlled process for patching.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Bit9 Releases 2013 Server Security Survey Report

March 30, 2013 Added by:Mike Lennon

Security vendor Bit9, best known for its application whitelisting solutions, recently released its second annual server security survey of nearly 1,000 IT and security professionals worldwide.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

SCADA and ICS Security Patching: The Good, the Bad and the Ugly

March 26, 2013 Added by:Eric Byres

Let's examine the good, the bad and the ugly details of patching as a means to secure SCADA and ICS systems. And to begin, let’s suppose patches could be installed without shutting down the process...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Email Security: It's Every Employee's Business

March 22, 2013 Added by:Allan Pratt, MBA

Email security has become part of the job description for every employee. All it takes is one employee to cause a breach that opens up the entire company.

Comments  (0)

1de705dde1cf97450678321cd77853d9

Hardening Is Hard If You're Doing It Right

March 20, 2013 Added by:Ian Tibble

The early days of deciding what to do with the risk will be slow and difficult and there might even be some feisty exchanges, but eventually, addressing the risk becomes a mature, documented process that almost melts into the background hum of the machinery of a business.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Insecure Security Products, Krebs Gets Swatted

March 17, 2013 Added by:Anthony M. Freed

You want to secure your networks and systems, so you deploy solutions from well known vendors. Are those security appliances themselves secure? Not always, says researcher Ben Williams of NCC Group.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

SCADA and ICS Security: Welcome to the Patching Treadmill

March 15, 2013 Added by:Eric Byres

After Stuxnet, security researchers and hackers on the prowl for new targets to exploit shifted their efforts to critical industrial infrastructure. Unfortunately, the SCADA and Industrial Control Systems applications they are now focusing on are sitting ducks.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

How Secure Is Your Mobile Device?

March 13, 2013 Added by:Allan Pratt, MBA

Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Security Risks of Telecommuting

March 06, 2013 Added by:Allan Pratt, MBA

In today’s work environment, costs are skyrocketing, but one way to reduce costs is to offer a telecommuting option for employees. While it may be easier for telecommuting employees to perform their work at home or in the field, the process doesn’t happen without posing serious security risks.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

SANS SCADA and Process Control Security Survey - The State of the Industry is Discouraging

March 04, 2013 Added by:Joe Weiss

SANS has published their SANS SCADA and Process Control Security Survey. The results paint a very confusing picture and actually demonstrate the existing approaches to awareness and security are not working.

Comments  (0)

Da3ca2c61c4790bcbd81ebf28318d10a

Cyberspace; It's a Medium, Not a Place.

February 23, 2013 Added by:Krypt3ia

Much hay has been made over the use of the term “Cyberspace” since all this talk about cyberwar has been bandied about. I for one have also been one of the more vocal personages yelling online and off about the use of the term or more to the point its over-use and lack of real context.

Comments  (0)

875b62bb8cdfb9fb199603e9e24a54a6

Despite a Decade of Security Upgrades, Windows Vulnerabilities Still Exist

February 22, 2013 Added by:Mark Austin

Windows 8 is touted, rightfully so, for being the most secure Windows operating system yet. However, it would be a mistake to believe that Windows 8 does not require external security enhancements.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »