Items Tagged with "Security"


5 Common Windows Hardening Misconfigurations

October 31, 2013 Added by:Rohit Sethi

Over numerous Windows configuration review engagements that we have performed for our clients, we observed a common pattern in the configuration weaknesses that are worth highlighting here.

Comments  (0)


What Is Your Browser Doing Behind Your Back?

October 09, 2013 Added by:Kyle Adams

Browsers have become extremely complex over the last few years, so does everyone fully understand everything a modern browser does? Of course everyone is familiar with the point and click, redirections, forms . . . normal Web stuff. What you might not know, is that your browser does a lot of things automatically without you asking it to.

Comments  (0)


Do You Plan to Use the Per App VPN Feature in iOS 7?

September 24, 2013 Added by:Patrick Oliver Graf

Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any easier. However, with several new business-centric features now included in the upcoming iOS 7 release, that could all be about to change.

Comments  (0)


Today's Mobile Device Data Protection Must Go Beyond Encryption

August 21, 2013 Added by:Cam Roberson

Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.

Comments  (50)


Securing Bitcoin - The New Frontier

August 20, 2013 Added by:Stephen Marchewitz

Virtual currency is picking up steam, and with that security issues are growing as well. While many issues with the traditional internet systems (banking, credit card and fund transfer systems, etc.) are averted by the way virtual currency is architected (which gives it a great advantage), security will always be a concern.

Comments  (20)


Out with the Desktop PC, In with the Thin Client: Let’s Start the Conversation

July 30, 2013 Added by:Allan Pratt, MBA

Whether by accident or on purpose, the PC is now becoming an attack vector. Employees can bring USB drives from home – that are infected without their knowledge – and infect their office machines as well as the network. Malicious individuals can do the same.

Comments  (3)


Mitigate Security Risk Before Your Business Collapses

July 11, 2013 Added by:Jan Valcke

Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.

Comments  (0)


Identity & Access Management: Give Me a REST

June 19, 2013 Added by:Simon Moffatt

RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.

Comments  (0)


Identity Management: The First Step in Protecting from the Inside Out

June 07, 2013 Added by:Michael Fornal

Identity Management applications are slowly gaining speed in the security realm as an important tool in managing provisions of an applications or to aid in gaining a handle on compliance and identity governance.

Comments  (0)


The Disclosure Debate Continues….. (part 1,453, 769) to be Continued

May 23, 2013 Added by:Andy Willingham

Here we go again. Another security researcher who apparently thinks that he knows best because his feelings were hurt by Microsoft.

Comments  (0)


Managing My Company’s Security is a Nightmare

May 17, 2013 Added by:Luis Corrons

IT Departments are very often one step behind users, and unfortunately in most cases there is no real control over all devices on the corporate network. Despite perimeter solutions still being a necessity, the corporate perimeter must now expand to include new devices (mainly smartphones and tablets) that also handle confidential corporate information.

Comments  (0)


Bridging the Cybersecurity Divide, Why Security Innovation Must Lead the Way

May 16, 2013 Added by:Francis Cianfrocca

Despite years of engineering, programming, reverse engineering, product development and a generous amount of FUD-driven marketing, the information security industry (loosely defined as representing the forces of good) lags far behind the innovation and sophistication of modern malware perpetrated by the forces of evil.

Comments  (5)


ATM Security (And Really Learning from the Past)

May 14, 2013 Added by:Andy Willingham

There are lots of other things that go into ATM security that can have a big impact on ensuring that it is as secure as possible.

Comments  (1)


Mobile Security Processes Could Be Applied to Medical Devices: Bluebox

May 10, 2013 Added by:Steve Ragan

Before malware could become a threat to medical devices, Adam Ely said attackers would have to write malware specifically targeted to these devices and organizations; or the devices would have to adopt a standard platforms and software.

Comments  (8)


SCADA and ICS Cyber Security - Facing the Facts

May 05, 2013 Added by:Eric Byres

In the past, the main reason for securing a SCADA/ICS network was to protect against inadvertent network incidents or attacks from insiders. The risk of an external malicious cyber-attack was considered minimal.

Comments  (0)


Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »