Blog Posts Tagged with "Security"


There's a New Sheriff in Town – PCI DSS Lays Down the Law to Improve Pen Testing Requirements

January 29, 2014 Added by:Michael Sabo

The PCI’s 12 mandatory requirements are designed to protect cardholder data from the threat of fraud or theft. Requirement 11.3 gets to the heart of the pen test, and it was revised in PCI-DSS version 3.0.

Comments  (0)


The Perils of Combining Security and Compliance

January 27, 2014 Added by:Robb Reck

There is a natural tendency to lump security and compliance together. Intuitively it just makes sense right? The biggest compliance frameworks like PCI, GLBA, SOX and HIPAA are all looking to ensure that our security is up to snuff. In fact, if we do security right, compliance should come naturally, with very little additional technical work.

Comments  (0)


Consider Security Before Building Your Nest

January 23, 2014 Added by:Robert Shaker

We have already seen attacks from the virtual world affecting the physical world, so, wouldn't it be great if an attacker could shut down our refrigerators or the chillers and freezers in the Supermarkets?

Comments  (2)


Improving SCADA System Security (Part 1)

December 21, 2013 Added by:InfoSec Institute

Supervisory control and data acquisition (SCADA) networks are considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats that could compromise their ordinary operation.

Comments  (0)


Using iGoat to Explore Mobile Application Security Weaknesses

December 16, 2013 Added by:Michael Smith

The purpose of this post is to walk through all the steps needed to get iGoat setup “Soup to Nuts”. There is nothing here that is too difficult, but there are a few pitfalls in making this work.

Comments  (0)


Why Security Issues May Chronically Hinder Bitcoin Adoption

December 03, 2013 Added by:Tripwire Inc

This article is mostly inspired by Jeff Garzik’s post, “‘Solution’ to bitcoin volatility,” in which Jeff, a Bitcoin core developer, discusses the price volatility which many feel is holding back Bitcoin from being a usable currency.

Comments  (0)


Free Security Event This Thursday in New York City

November 05, 2013 Added by:InfosecIsland News

Please join Trend Micro and SecurityWeek on Thursday, Nov. 7th at Blue Fin at the W Hotel in Times Square for an interactive security event with great food and open bar!

Comments  (0)


Preparing for the Internet of Things: Integrating Strong Authentication in Daily Life

November 04, 2013 Added by:Jochem Binst

The online world as we know it today is not the same as the one we got to know in the beginning of the Internet era and certainly not the one that is emerging today! People worldwide are starting to realize this. All they have to do now is act on it. Strong authentication to secure the online world will be embraced since it becomes a necessity; using strong authentication is the next step.

Comments  (0)


5 Common Windows Hardening Misconfigurations

October 31, 2013 Added by:Rohit Sethi

Over numerous Windows configuration review engagements that we have performed for our clients, we observed a common pattern in the configuration weaknesses that are worth highlighting here.

Comments  (0)


What Is Your Browser Doing Behind Your Back?

October 09, 2013 Added by:Kyle Adams

Browsers have become extremely complex over the last few years, so does everyone fully understand everything a modern browser does? Of course everyone is familiar with the point and click, redirections, forms . . . normal Web stuff. What you might not know, is that your browser does a lot of things automatically without you asking it to.

Comments  (0)


Do You Plan to Use the Per App VPN Feature in iOS 7?

September 24, 2013 Added by:Patrick Oliver Graf

Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any easier. However, with several new business-centric features now included in the upcoming iOS 7 release, that could all be about to change.

Comments  (0)


Today's Mobile Device Data Protection Must Go Beyond Encryption

August 21, 2013 Added by:Cam Roberson

Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.

Comments  (50)


Securing Bitcoin - The New Frontier

August 20, 2013 Added by:Stephen Marchewitz

Virtual currency is picking up steam, and with that security issues are growing as well. While many issues with the traditional internet systems (banking, credit card and fund transfer systems, etc.) are averted by the way virtual currency is architected (which gives it a great advantage), security will always be a concern.

Comments  (20)


Out with the Desktop PC, In with the Thin Client: Let’s Start the Conversation

July 30, 2013 Added by:Allan Pratt, MBA

Whether by accident or on purpose, the PC is now becoming an attack vector. Employees can bring USB drives from home – that are infected without their knowledge – and infect their office machines as well as the network. Malicious individuals can do the same.

Comments  (3)


Mitigate Security Risk Before Your Business Collapses

July 11, 2013 Added by:Jan Valcke

Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.

Comments  (0)


Identity & Access Management: Give Me a REST

June 19, 2013 Added by:Simon Moffatt

RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »