Firewalls

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Automatic Hotspot Login is Important in VPNs

July 07, 2015 Added by:Patrick Oliver Graf

If you were a hacker targeting a network, which would be most appealing – a network contained in a residential building, an office or corporate facility, or a public place?   The information contained on the network of a residential building probably wouldn't be particularly valuable, and it would also be well-protected. You'd face even more security ...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

OPM Breach Shows Need for ‘Nimble’ Government Network Security

July 07, 2015 Added by:Patrick Oliver Graf

No matter how you look at it, the Office of Personnel Management (OPM) is on the hook for revealing the records of millions of Americans. The only question is how many millions.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

'Lotus Blossom' Cyber-espionage Campaign Stretches Back 3 Years: Palo Alto Networks

June 22, 2015 Added by:Brian Prince

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hackers Targeted the Polish Airline LOT, Grounded 1,400 Passengers

June 22, 2015 Added by:Pierluigi Paganini

The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport.

Comments  (0)

6d117b57d55f63febe392e40a478011f

DDoS Attacks Cost Victims Average of $40,000 per Hour

June 18, 2015 Added by:Anthony M. Freed

The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Once More on Cloud SIEM or SaaS SIEM

June 17, 2015 Added by:Anton Chuvakin

A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Need to Address the Cyber Security of Field Controllers and Sensors (Level 1 Devices)

June 17, 2015 Added by:Joe Weiss

The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

China Uses Watering Hole Attacks, JSONP Hijacking to Identify Users

June 16, 2015 Added by:Eduard Kovacs

Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Weak Remote Access Practices Contributed to Nearly All PoS Breaches: Trustwave

June 11, 2015 Added by:Brian Prince

It's not just hype - point-of-sale (PoS) systems are being compromised more than ever, and much of the blame falls on mistakes surrounding remote access.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »