April 24, 2014 Added by:John Grady
The first step is to think strategically, which means creating policies and procedures aimed at the enterprise network as a whole rather than handling issues case by case.
April 23, 2014 Added by:Tripwire Inc
Know what you have, know how it’s vulnerable, configure it securely, and continuously monitor it to ensure it isn’t compromised and remains secure.
April 23, 2014 Added by:InfosecIsland News
SecurityWeek Invites You to Participate in The 2014 SecurityWeek Golf Classic! Our first classic is being held on May 22, 2014 at the prestigious world-class Ocean Course at Half Moon Bay, located just 23 miles from San Francisco International Airport.
April 23, 2014 Added by:Jeffrey Carr
On May 19th the Suits and Spooks Security Start-up Speed Lunch will give each founder of up to 20 cyber security start-ups an opportunity to spend 6 minutes to pitch a product to a Director or higher-level executive at a private table in an exclusive setting.
April 22, 2014 Added by:Anthony M. Freed
NIST has officially announced the decision to remove the cryptographic algorithm from its revised guidance on random number generators
April 22, 2014 Added by:InfosecIsland News
Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).
April 22, 2014 Added by:Robb Reck
In March I began my quest to interview some of the most interesting folks in the Colorado security community. I had the pleasure of sitting down with Chris Petersen, CTO and co-founder of LogRhythm.
April 21, 2014 Added by:Dan Dieterle
You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the latest modules from Metasploit you can quickly see the exploit in action.