Blog Posts Tagged with "Security"

5e402abc3fedaf8927900f014ccc031f

Out with the Desktop PC, In with the Thin Client: Let’s Start the Conversation

July 30, 2013 Added by:Allan Pratt, MBA

Whether by accident or on purpose, the PC is now becoming an attack vector. Employees can bring USB drives from home – that are infected without their knowledge – and infect their office machines as well as the network. Malicious individuals can do the same.

Comments  (3)

D2c1e74cac8f12e965acd1a21fef3a38

Mitigate Security Risk Before Your Business Collapses

July 11, 2013 Added by:Jan Valcke

Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Identity & Access Management: Give Me a REST

June 19, 2013 Added by:Simon Moffatt

RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.

Comments  (0)

5c549756b3c0b3d5c743158a72ce3809

Identity Management: The First Step in Protecting from the Inside Out

June 07, 2013 Added by:Michael Fornal

Identity Management applications are slowly gaining speed in the security realm as an important tool in managing provisions of an applications or to aid in gaining a handle on compliance and identity governance.

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

The Disclosure Debate Continues….. (part 1,453, 769) to be Continued

May 23, 2013 Added by:Andy Willingham

Here we go again. Another security researcher who apparently thinks that he knows best because his feelings were hurt by Microsoft.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

Managing My Company’s Security is a Nightmare

May 17, 2013 Added by:Luis Corrons

IT Departments are very often one step behind users, and unfortunately in most cases there is no real control over all devices on the corporate network. Despite perimeter solutions still being a necessity, the corporate perimeter must now expand to include new devices (mainly smartphones and tablets) that also handle confidential corporate information.

Comments  (0)

9f7431ea593b8e57401c08f40adc6e34

Bridging the Cybersecurity Divide, Why Security Innovation Must Lead the Way

May 16, 2013 Added by:Francis Cianfrocca

Despite years of engineering, programming, reverse engineering, product development and a generous amount of FUD-driven marketing, the information security industry (loosely defined as representing the forces of good) lags far behind the innovation and sophistication of modern malware perpetrated by the forces of evil.

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

ATM Security (And Really Learning from the Past)

May 14, 2013 Added by:Andy Willingham

There are lots of other things that go into ATM security that can have a big impact on ensuring that it is as secure as possible.

Comments  (1)

A58bf865b185e0e3f665473bf8f3ca6d

Mobile Security Processes Could Be Applied to Medical Devices: Bluebox

May 10, 2013 Added by:Steve Ragan

Before malware could become a threat to medical devices, Adam Ely said attackers would have to write malware specifically targeted to these devices and organizations; or the devices would have to adopt a standard platforms and software.

Comments  (1)

8a958994958cdf24f0dc051edfe29462

Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

8e6e3972318ff74b194801340248199e

DLP and Business Needs

April 16, 2013 Added by:Scott Thomas

Most non-IT people know about DLP only when the IT organization contacts them to let them know they did something they shouldn't have. For those of us that have to deal with the policies, the alerts, and sending those notices, it can be more complicated.

Comments  (0)

36317a78f97d1d6d7a02333ad01186fa

New Approaches for Blocking Zero-Day Exploits to Prevent APTs

April 16, 2013 Added by:George Tubin

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation.

Comments  (1)

32137b352537f11c1efe063869f00e0e

Your Weekend Security Challenge: Password-Style

April 12, 2013 Added by:Le Grecs

Password managers will automatically fill in usernames and passwords as your target surfs around the web doing their usual things. I’ve found they just love this convenience and it serves as a great motivator for them to continue using it.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

April 09, 2013 Added by:Ben Rothke

In Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, authors Eric Knapp and Raj Samani provide and excellent overview on what the smart grid is and how it can be secured.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Enter the CISO: Torchbearer of Security and Risk Management

April 06, 2013 Added by:Anthony M. Freed

In a convergence culture, accountability for risk is accepted across the organization, and when that happens, risk management becomes a priority to the business, informing strategy and objectives. By helping identify and mitigate risk across finance, operations and IT, the CISO puts security in context of what could affect profit.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Making Patching Work for SCADA and Industrial Control System Security

April 05, 2013 Added by:Eric Byres

Applying patches is a critical part of good security. According to US-CERT, about 95% of all network intrusions could have been avoided by keeping systems up to date with appropriate patches. What I am against is patching as a knee-jerk reaction to security vulnerabilities. You can’t expect your control system to operate reliably if you don’t have a controlled process for patching.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »