Latest Posts

Bd07d58f0d31d48d3764821d109bf165

Prohibiting RC4 Cipher Suites

February 26, 2015 Added by:Tripwire Inc

I’ve long believed that RC4 was dead based on past research and multiple vendors have already declared it dead.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Control System Cyber Security and the Insurance Industry

February 26, 2015 Added by:Joe Weiss

I have felt that the insurance companies can be a major player in driving the need to adequately secure control systems.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Open Haus: Wi-Fi and Seamless Roaming for Mobile Workers

February 26, 2015 Added by:Patrick Oliver Graf

Whatever you picture, the fact is that mobility is now a key expectation of many employees. Those who work from laptops, tablets and other mobile devices need to be certain that the technology they depend on is able to follow them from place to place, without any service interruption.

Comments  (0)

E3a9682e949423ecdcbe7e0a0b2ff990

Owning your own data – Data residency laws

February 26, 2015 Added by:Willy Leichter

A question I get asked a lot at is, “If there is a data center in my region, do I still need to protect my own data if I’m concerned about say data residency laws?”

Comments  (0)

Default-avatar

Babar: Suspected Nation State Spyware In The Spotlight

February 25, 2015 Added by:Cyphort

Cyphort Labs has collected and analyzed a highly advanced piece of malware, which for all intents and purposes seems to be a full blown cyber espionage tool of the kind a nation state would be behind.

Comments  (1)

6d117b57d55f63febe392e40a478011f

FFIEC Adds Cyber-Resilience to Business Continuity Guidelines

February 25, 2015 Added by:Anthony M. Freed

The Federal Financial Institutions Examination Council (FFIEC) has issued revised Business Continuity Planning (BCP) guidelines for the financial services sector

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Keep Your Hands Off My SSL Traffic

February 25, 2015 Added by:Brent Huston

If you have been living under an online rock these last couple of weeks, then you might have missed all of the news and hype about the threats to your SSL traffic.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Gemalto Presents Findings of Investigations Into Alleged Hacking of SIM Card Encryption Keys by GCHQ and NSA

February 25, 2015 Added by:InfosecIsland News

Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)

Comments  (0)

0ead717779244d9aab5c1699308850d2

Old Vulnerabilities Still Popular Targets for Hackers: HP

February 24, 2015 Added by:Brian Prince

According to the latest edition of Hewlett-Packard's Cyber Risk Report, 44 percent of known breaches in 2014 came from vulnerabilities that were between two and four years old.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Those Pesky Users: How To Catch Bad Usage of Good Accounts

February 24, 2015 Added by:Anton Chuvakin

Stolen credentials, guessed passwords, pass-the-hash and other means of gaining system access present an exciting challenge to those folks who already woke from the mortal slumber of “isn’t my firewall and AV enough?”

Comments  (0)