Firewalls

F5b1211c3952ce30f829cd3c757a1a7f

Cyphort Detects Surge in Ad Network Infections, a.k.a. “Malvertising”

July 24, 2014 Added by:Ali Golshan

We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Israeli Military and Hamas trade Hacking Attacks

July 24, 2014 Added by:Dan Dieterle

As Israeli ground forces push into Gaza to remove militant Islamic troops and missiles, hacking teams from both sides ply their trades.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Crypto Locker Down, But NOT Out

July 23, 2014 Added by:Brent Huston

Even as the govt was touting their takedown, threat intelligence companies around the world (including MSI), were already noticing that the attackers were mutating, adapting and re-building a new platform to continue their attacks.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Snowden Continues to Expose Allied Cyber Tactics

July 17, 2014 Added by:Dan Dieterle

NSA whistleblower and Putin poster boy Edward Snowden apparently released yet another document, this one exposing UK cyber spying techniques allegedly used by the GCHQ.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Hacks of Houston Astros, Butler University Put Network Security on Center Stage

July 14, 2014 Added by:Patrick Oliver Graf

Together, the high-profile hacking of the Houston Astros and Butler University show why it’s important for every organization to think like an enterprise in constructing a network security plan.

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Cyber Espionage Campaign Hits Energy Companies

July 10, 2014 Added by:Joel Langill

Over the past couple of weeks, cybersecurity vendors have announced the uncovering of a successful cyber espionage campaign carried out by the Dragonfy hacking group.

Comments  (0)

4e9404278ec48b9cce4fcfa8ca048c29

Defense in Depth for Advanced Threat Protection

July 09, 2014 Added by:Alain Mayer

I believe that defense in depth – a long-established information assurance concept – can help in developing a sensible strategy for the evolving threat landscape.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Google Aurora vs ICS Aurora – An industry and DHS Debacle

July 08, 2014 Added by:Joe Weiss

This is actually two blogs in one. The first is about DHS releasing critical information they weren’t even asked for. The second is about the lack of progress on addressing a subject that DHS made public.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Information Security, Post-Snowden

July 08, 2014 Added by:Don Eijndhoven

The revelations regarding the extensive digital intelligence gathering programs of the American National ...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Government Network Security Failures Led to Remote Access Breaches

July 07, 2014 Added by:Patrick Oliver Graf

Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.

Comments  (0)

C55430fdfdac11fc3771a9b94e2bb854

The Security Perimeter is Dead, Long Live the Security Perimeter

July 07, 2014 Added by:Dana Wolf

Forward-thinking companies that tend to be targeted by cyberattacks can no longer afford to play defense with their data assets. With no perimeter left to defend, they need to arm themselves with tools to fight the next battle, not the last one.

Comments  (0)

Default-avatar

How Enterprises Can Leverage SMS to Minimize Security Risks and Aftermath

July 03, 2014 Added by:Steve French

As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

IoT: Get Security Right The First Time

June 30, 2014 Added by:Patrick Oliver Graf

While there’s excitement about IoT’s potential to create new business and boost productivity and convenience, the technology community can’t forget about security.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why a User-Centric Approach is Required for Network Security

June 25, 2014 Added by:Patrick Oliver Graf

With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »