Security Awareness

37d5f81e2277051bc17116221040d51c

Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)

4e714dc795dc50b932e2a837e3efc472

Security Patents Invite Hacker Exploitations

August 24, 2010 Added by:Joe Morrissey

If you had devised a new, novel, non-obvious lock for protecting your house – would you give thieves a drawing of the lock so they could fabricate a key? No, bloody right you wouldn’t – nor would I. But in filing a patent, that is exactly what we would be required to do...

Comments  (17)

37d5f81e2277051bc17116221040d51c

Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Data Security Breaches Wreak Havoc

August 23, 2010 Added by:Danny Lieberman

I am at a loss to understand why the US needs another data security bill. Looking at data security as an exercise in providing cost effect security countermeasures, it appears to me that the bill is most likely either a public relations play or congressional logrolling...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Spies Among Us

August 22, 2010 Added by:Robert Siciliano

The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyber Warfare and the Conflict in Iraq

August 20, 2010 Added by:Theresa Payton

This paper recognizes some denied and approved cyber attacks that have been used in Iraq, identifies the major causes of the United States’ apprehension about using cyber warfare, and analyzes how the United States can streamline future use of cyber warfare...

Comments  (1)

7ce032c184c593a533f07004162c53bb

Where Plaintiff's Went Wrong with Heartland Suit

August 19, 2010 Added by:Carter Schoenberg

One area I continue to grow frustrated with is when a large security breach occurs and yet other than FTC sanctions, not much else happens. Why? I think its along the same lines as why most CISO's complain that CEO's don't take security as serious as they should...

Comments  (0)

C7159a557369b66632c4b54bf746b69e

4 Steps to Managing Your Security Documents

August 18, 2010 Added by:Sean Inman

There are many document management systems out there, both proprietary and open-source. Document management isn’t just storing documents, its a process of reviews, approvals, storage and communication . So lets dissect these processes...

Comments  (4)

1f2f664e68a603b3c54890fbbcd37857

Security and Privacy in 2010

August 16, 2010 Added by:Mark Gardner

Wikileaks thrives because of a lack of openness, leading to the conclusion that there is potential for more openness in all Government. However, as in our private lives, some things should stay just that - private - particularly with regard to areas of national security...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Virtual doors Keep Out the Uninvited

August 11, 2010 Added by:Christopher Burgess

Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)

Page « < 48 - 49 - 50 - 51 - 52 > »