Blog Posts Tagged with "Layered Security"

0a8cae998f9c51e3b3c0ccbaddf521aa

There is no Onion - The Painful Reality of Defense in Depth

June 26, 2013 Added by:Rafal Los

Imagine if you woke up tomorrow morning and it was conclusively proven that the layered onion model was proven to fail in several circumstances commonly deployed and used in today’s enterprise. That would sure explain much of the failure we’ve seen across enterprise breaches, wouldn’t it?

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Is Hiding the Wireless SSID All the Network Security You Need?

June 20, 2012 Added by:Dale Rapp

The bad guy doesn't need to know if a wireless network is hidden or connected to the network to capture unencrypted traffic, and this unencrypted traffic could be divulging emails you send, web sites you visit, and passwords you type into log in pages. Encryption should always be used...

Comments  (3)

37d5f81e2277051bc17116221040d51c

Five FFIEC Compliance Tips For Banks

January 10, 2012 Added by:Robert Siciliano

“The guidance is an important reinforcement of several critical ideas: Fraud losses undermine faith in our financial system. Fraud tactics evolve constantly and the tools that combat them have to evolve as well. The guidance provides a perspective..."

Comments  (0)