September 2014
-
September 30, 2014
30
Sep'14
How to use VMware ESXi hosts for sandbox testing
Video: Keith Barker of CBT Nuggets shows how to use VMware ESXi hosts to perform sandbox testing on virtual machines. Continue Reading
-
September 29, 2014
29
Sep'14
Intrusion detection and prevention: IT decision center
Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision ... Continue Reading
-
September 29, 2014
29
Sep'14
Vendors push new Bash patches as more flaws emerge
Vendors are hurriedly implementing a new patch released over the weekend for the 'Shellshock' Bash vulnerability, but researchers have since found more Bash flaws that will likely need prompt remediation. Continue Reading
-
September 29, 2014
29
Sep'14
Malvertising problem to worsen as attacks become more sophisticated
Malvertising is already being used by attackers as a delivery mechanism for exploit kits, and new research reveals the problem is likely to get worse, specifically in the form of malicious Flash banners. Continue Reading
-
September 29, 2014
29
Sep'14
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
-
September 29, 2014
29
Sep'14
Wireless access point security: Defending against Chameleon malware
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware. Continue Reading
-
September 26, 2014
26
Sep'14
Estimate the cost of a data breach with CyberTab
The CyberTab tool aims to help enterprises estimate the cost of a data breach, as well as estimate the cost of resources to prevent future breaches. Continue Reading
-
September 26, 2014
26
Sep'14
Attackers already targeting Bash security vulnerability
Exploits are already being written and rewritten for the 'Shellshock' Bash security vulnerability, which was announced just days ago, increasing the urgency for enterprises to remediate it quickly. Continue Reading
-
September 26, 2014
26
Sep'14
Bash bug creates wave of shell security concerns on social media
News roundup: The revelation that the Bash bug could be the worst worm outbreak in more than a decade started a frenzy on social media. Plus: a 'Kyle and Stan' malvertising update; GM ups auto cybersecurity; two data breaches; and more. Continue Reading
-
September 25, 2014
25
Sep'14
On Shellshock Bash vulnerability, experts scramble amid active exploits
As attackers begin exploiting the 'Shellshock' Bash vulnerability, experts say many attack vectors remain unknown, making immediate remediation extremely critical. Continue Reading
-
September 25, 2014
25
Sep'14
PCI DSS 3.0 compliance is mandatory in 2015. Are you ready?
The deadline to meet the PCI DSS 3.0 changes for mandatory compliance is right around the corner. Expert Mike Chapple explains what the changes are and how to prepare for them. Continue Reading
-
September 25, 2014
25
Sep'14
In Heartbleed's wake, Bash shell flaw puts Linux, Mac OS users at risk
Experts say a 20-year-old vulnerability uncovered in the Bash shell, found in Unix-based operating systems including Linux and Mac OS, could lead to a dangerous worm outbreak unlike anything seen in more than a decade. Continue Reading
-
September 24, 2014
24
Sep'14
What's the best way to secure Wi-Fi access for mobile employees?
Employees who work on-the-go rely on Wi-Fi access to get work done, but are those connections secure? Expert Kevin Beaver explains how to achieve Wi-Fi access security success. Continue Reading
-
September 23, 2014
23
Sep'14
BYOD security concerns not deterring personal device use
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly. Continue Reading
-
September 23, 2014
23
Sep'14
Is the Pwn Phone an effective enterprise security testing tool?
The Pwn Phone can reportedly detect network vulnerabilities instantly, but its use in the enterprise is questionable. Kevin Beaver explains. Continue Reading
-
September 22, 2014
22
Sep'14
Intrusion detection and prevention: Decision time
To protect your system it's essential to select an IDS/IPS offering that effectively blocks attacks and complements your existing security controls. Continue Reading
-
September 22, 2014
22
Sep'14
Intrusion detection and prevention: RFP technology decisions
Evaluating IDS/IPS technology requires you to understand its capabilities and how they might complement your existing security infrastructure. Learn about the options available, and what to ask vendors, in order to select the best strategy for your ... Continue Reading
-
September 22, 2014
22
Sep'14
Intrusion detection and prevention: From business problem to technical solution
Malicious intruders are intent on breaking into your corporate systems. The latest IDS/IPS technologies, though, are effective means prevent or at least identify and minimize security breaches. Learn what IDS and IPS can do and what the concrete ... Continue Reading
-
September 19, 2014
19
Sep'14
Adding the age of networking devices into a security risk assessment
Recent data shows that more than 50% of all networking devices are aging or obsolete and pose a security risk to the enterprise. Expert Kevin Beaver discusses how to factor device age into a security risk assessment. Continue Reading
-
September 19, 2014
19
Sep'14
Bitcoin exchanges maturing, but Bitcoin security still a concern
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security. Continue Reading