Latest Posts

93c815429fc1ab15a9295a4f55989ae0

Is There a Business Case in Planning for Data Breaches?

October 30, 2014 Added by:Neohapsis

Sadly, even with sophisticated layers of defense, many organizations are facing similar thought processes of what to do “when” a data breach takes place rather than “if”.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On MSSP Personnel

October 30, 2014 Added by:Anton Chuvakin

A wise CSO once told me that in order to outsource a security process (such as security monitoring or device management) and achieve a great result, you have to know precisely how a great process of that kind looks like.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Compliance-Based Infosec Vs Threat-Based Infosec

October 29, 2014 Added by:Brent Huston

Compliance-based infosec, when implemented correctly, is really the best kind of defense there is. The problem is, the only place I’ve ever seen it really done right is in the military.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Healthcare Data Today: In Motion or Out of Control?

October 28, 2014 Added by:Patrick Oliver Graf

From October 2009 through the present day, one industry alone has reported 900 different breaches. And none of those 900 were limited in their scope – in each, at least 500 individuals were affected. Who knows how many other smaller breaches happened, without public knowledge.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On MSSP SLAs

October 28, 2014 Added by:Anton Chuvakin

SLAs play a role here as well, and – you guessed it – what you need here also depends on the maturity of your change management processes.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Distinguishing Acts of War in Cyberspace

October 27, 2014 Added by:Stefano Mele

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

NIST warns on Zero-Day flaw in Samsung FindMyMobile

October 27, 2014 Added by:Pierluigi Paganini

The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: How Gaps In SSH Security Create an Open Door for Attackers

October 27, 2014 Added by:InfosecIsland News

Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cyber Security Careers: What You Need To Know To Advance In The Security Field

October 23, 2014 Added by:Tripwire Inc

Skilled people make the difference in protecting sensitive data, so it’s more critical than ever that public and private sectors begin training and hiring cyber security professionals.

Comments  (1)