Firewalls

E595c1d49bf4a26f8e14ce59812af80e

The Three Human Failures Behind Remote Access Shortcomings

November 25, 2014 Added by:Patrick Oliver Graf

When IT staff and employees do fall short – and they will from time to time – it's this multi-layered, redundant approach to network security, which includes technologies like firewalls, VPNs and intrusion detection systems all working together that will keep a company's digital secrets safe.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Operation Onymous Challenges Tor to Strengthen Its Security

November 19, 2014 Added by:Tripwire Inc

Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Centralization: The Hidden Trap

November 19, 2014 Added by:Brent Huston

What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Launching in 2015: A Certificate Authority to Encrypt the Entire Web

November 18, 2014 Added by:Electronic Frontier Foundation

Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Cyber Threats in 2015: New Attack Vectors, More Severe Incidents

November 18, 2014 Added by:Patrick Oliver Graf

One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Arrogance of the US Nuclear Power Industry - We Don't Want to Look at Everything

November 17, 2014 Added by:Joe Weiss

In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

How Can ICS Cyber Security Risk be Quantified and What Does it Mean to Aurora

November 13, 2014 Added by:Joe Weiss

Risk is defined as frequency times consequence. There is little information on frequency of ICS cyber attacks.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

How to Steal Data From an Airgapped Computer Using FM Radio Waves

November 12, 2014 Added by:Tripwire Inc

More and more organisations today have some airgapped computers, physically isolated from other systems with no Internet connection to the outside world or other networks inside their company.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Preventing and Recovering From Cybercrime

November 10, 2014 Added by:Pierluigi Paganini

Prevention means to secure every single resource involved in the business processes, including personnel and IT infrastructure.

Comments  (2)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

1de705dde1cf97450678321cd77853d9

Security Pseudo-skills and the Power of 6

November 03, 2014 Added by:Ian Tibble

How many Security Analysts does it take to change a light bulb? The answer should be one but it seems organisations are insistent on spending huge amounts of money on armies of Analysts with very niche "skills", as opposed to 6 (yes, 6!) Analysts with certain core skills groups whose abilities complement each other. Banks and telcos with 300 security professionals could reduce that number to 6.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

On MSSP SLAs

October 28, 2014 Added by:Anton Chuvakin

SLAs play a role here as well, and – you guessed it – what you need here also depends on the maturity of your change management processes.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: How Gaps In SSH Security Create an Open Door for Attackers

October 27, 2014 Added by:InfosecIsland News

Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Mana Tutorial: The Intelligent Rogue Wi-Fi Router

October 21, 2014 Added by:Dan Dieterle

Like other rogue Wi-Fi AP programs Mana creates a rogue AP device, but Mana does so much more.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »