Blog Posts Tagged with "Security"


SCADA and ICS Security: Welcome to the Patching Treadmill

March 15, 2013 Added by:Eric Byres

After Stuxnet, security researchers and hackers on the prowl for new targets to exploit shifted their efforts to critical industrial infrastructure. Unfortunately, the SCADA and Industrial Control Systems applications they are now focusing on are sitting ducks.

Comments  (0)


How Secure Is Your Mobile Device?

March 13, 2013 Added by:Allan Pratt, MBA

Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.

Comments  (1)


Security Risks of Telecommuting

March 06, 2013 Added by:Allan Pratt, MBA

In today’s work environment, costs are skyrocketing, but one way to reduce costs is to offer a telecommuting option for employees. While it may be easier for telecommuting employees to perform their work at home or in the field, the process doesn’t happen without posing serious security risks.

Comments  (5)


SANS SCADA and Process Control Security Survey - The State of the Industry is Discouraging

March 04, 2013 Added by:Joe Weiss

SANS has published their SANS SCADA and Process Control Security Survey. The results paint a very confusing picture and actually demonstrate the existing approaches to awareness and security are not working.

Comments  (0)


Cyberspace; It's a Medium, Not a Place.

February 23, 2013 Added by:Krypt3ia

Much hay has been made over the use of the term “Cyberspace” since all this talk about cyberwar has been bandied about. I for one have also been one of the more vocal personages yelling online and off about the use of the term or more to the point its over-use and lack of real context.

Comments  (0)


Despite a Decade of Security Upgrades, Windows Vulnerabilities Still Exist

February 22, 2013 Added by:Mark Austin

Windows 8 is touted, rightfully so, for being the most secure Windows operating system yet. However, it would be a mistake to believe that Windows 8 does not require external security enhancements.

Comments  (0)


Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)


Time to Speak Up on New IF-MAP Specs for ICS and SCADA Security

February 12, 2013 Added by:Eric Byres

Something I believe industry urgently needs is better standards for information exchange between security solutions. Unfortunately while TCG has had feedback from the IT community, they have received little from the SCADA or ICS community. I encourage everyone involved with SCADA and ICS security to review the specification.

Comments  (0)


The Cyber Money Train

October 15, 2012 Added by:Joel Harding

Anything to do with Cyber equates to a lot of money. One estimate for CY 2012 was $13 Billion being budgeted for cybersecurity just for the US government. One study I read predicted we would need to increase spending by up to 1,800 percent. That, ladies and gentlemen, is a big chunk of change...

Comments  (1)


Research Sheds Light on New Surveillance Apps for Smartphones

September 04, 2012 Added by:Electronic Frontier Foundation

The FinSpy Mobile analysis will allow vulnerable and at-risk users to better understand the threat of government surveillance and make better judgements to protect their security and privacy. This software is sophisticated and powerful...

Comments  (0)


On Infosec Friends

August 24, 2012 Added by:Javvad Malik

They are the guys who you look out for and they look out for you. If you see a bug in their code, you’ll sort it out for them. When they call you up at 3am for help with a security strategy presentation, you stay up with them all night working on it. When you are stuck on something, you’ll turn to them for help....

Comments  (5)


Your CISSP is Worthless - So Now What?

August 23, 2012 Added by:Dave Shackleford

OK, so it’s not really worthless. So what do I propose? I say scrap the whole thing. Start over. Build a cert and program that tests fundamental skills and means something to employers who really need things done. Offer existing cert holders one year and a free test to get the new one. Otherwise, they’re out...

Comments  (22)


Vote for Boris Sverdlik aka JadedSecurity for ISC2 Board

August 23, 2012 Added by:Boris Sverdlik

I’m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change...

Comments  (0)


Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)


Infosec: Be All You Can Be

August 22, 2012 Added by:Randall Frietzsche

So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...

Comments  (7)


Security BSides is Coming Memphis

August 22, 2012 Added by:Security BSides

The goal of Security BSides is to expand the conversation beyond the traditional confines. BSides creates opportunities to both present and participate in an atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »