Firewalls

Ebb72d4bfba370aecb29bc7519c9dac2

Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?

January 27, 2015 Added by:Anton Chuvakin

Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.

Comments  (1)

Bf90bc151725ec2111a693c0d7eb0858

Stealth Mode: Lying in Wait Inside the White House’s Network

January 26, 2015 Added by:Wallace Sann

Federal agencies need to become more proactive and aggressive in protecting their biggest assets – their data.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Dark Technology: Are You (Unknowingly) Putting Your Organization At Risk?

January 21, 2015 Added by:Tripwire Inc

As we go about our daily lives, we are leaving subliminal digital traces behind us from our logical footprint.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

The NERC CIP's Are Not Making the Grid More Secure or Reliable

January 20, 2015 Added by:Joe Weiss

The North American Electric Corporation (NERC) Critical Infrastructure Protection (CIP) cyber security standards were developed to increase the cyber security and reliability of the electric grid. Unfortunately, they are not doing either.

Comments  (0)

Default-avatar

Microsoft SysInternals is Prone to False Negatives When Testing for Escalation of Privileges

January 20, 2015 Added by:Amit Serper

If we didn’t already get the memo in 2014, the Sony hack serves as a harsh reminder of how easy it is for attackers to hide undetected, inside a network for long periods of time.

Comments  (0)

Default-avatar

Microsoft SysInternals is Prone to False Negatives When Testing for Escalation of Privileges

January 20, 2015 Added by:Amit Serper

If we didn’t already get the memo in 2014, the Sony hack serves as a harsh reminder of how easy it is for attackers to hide undetected, inside a network for long periods of time.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Network Segmentation: A Best Practice We Should All be Using

January 19, 2015 Added by:Brent Huston

It would be nice to be able to say that we are winning the war; that network security efforts are slowly getting the better of the bad guys. But I can’t do that.

Comments  (0)

673de21f2652135087d940b7f65c4b5e

The Five Things CSOs Need to Know About Software-Defined Security

January 19, 2015 Added by:Carson Sweet

Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.

Comments  (1)

Default-avatar

Microsoft SysInternals flaw results in false negatives

January 19, 2015 Added by:Amit Serper

While security vendors continue to deliver more and better automation for incident response, all tools – even the best ones – have limits.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How Verizon and Turn Defeat Browser Privacy Protections

January 15, 2015 Added by:Electronic Frontier Foundation

Verizon advertising partner Turn has been caught using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them with dozens of major websites and ad networks, forming a vast web of non-consensual online tracking.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Don’t Trust your Router “Update” Feature

January 15, 2015 Added by:Dan Dieterle

With all the news of router exploits and compromised units being used by hacker groups for attacks, make sure you include installing router firmware updates as part of your scheduled maintenance routine.

Comments  (1)

6ee5846e0a227db0333ff7c99ff61313

When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Should Networked Safety Systems be Connected to Control Systems in Critical Applications

January 06, 2015 Added by:Joe Weiss

The interconnected networking of control and safety systems is making these processes much more productive, but more cyber vulnerable, and potentially less safe.

Comments  (5)

7ddc1f3000a13e4dfec28074e9e7b658

Let's Encrypt (the Entire Web): 2014 in Review

January 06, 2015 Added by:Electronic Frontier Foundation

We've been pursuing the ideas that turned into Let's Encrypt for three years, so it was a great pleasure to be able to share what we've been working on with the world.

Comments  (2)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (5)

65be44ae7088566069cc3bef454174a7

Addressing Mobile Risks in 2015

January 01, 2015 Added by:Rebecca Herold

We are literally putting more responsibility for the security of our business assets into the hands of our employees.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »