Blog Posts Tagged with "Monitoring"

69850a58aa122f9d42c80b2d502dec6a

Small Goals Lead to Bigger Results

November 01, 2011 Added by:Joshua Lochner

Based on application flows and the importance placed on a web presence, the goal is to configure notification level alerts to be sent to the System Administrators for security related events from the three servers in the front-end web server cluster, and configure emergency alerts...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Where Will 2012’s Online Threats Come From?

October 07, 2011 Added by:Infosec Island Admin

A recent survey released by PWC cites that over 75% of organizations are in the dark when it comes to online threats to their businesses. Given this rather alarming statistic, we wanted to point you towards two relevant SC magazine webcasts on finding and pre-empting hidden threats...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Giants Enlisted for Government Surveillance

October 03, 2011 Added by:Headlines

"When the possibility exists for information to be obtained that wasn't possible before, it's entirely understandable that law enforcement is interested. Then the issue would be, what's the right policy? And that, or course, engenders a lot of debate..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Microsoft's Addiction to Collecting Tracking Data

September 01, 2011 Added by:Headlines

"The Windows Mobile operating system is clearly sending information that can lead to accurate location information of the mobile device regardless of whether the user allowed it," said Kamkar, who provided the analysis of the tracking methods for Lawyers seeking to establish a class action lawsuit...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Top Ten Criteria for an SIEM

August 15, 2011 Added by:Anton Chuvakin

I spent years whining about how use cases and your requirements should be driving your SIEM purchase. And suddenly Anton shows up with a simple Top 10 list. This list was built with some underlying assumptions which I am not at liberty to disclose. Think large, maybe think SOC, think complex environment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Bankers Say Cyber Crime is Uncontrollable

August 11, 2011 Added by:Headlines

The results of a live poll conducted at its annual North American Insights client conference show fraud and cyber crime continue to be among the most daunting issues that banks are facing today. Bankers believe it is a challenge that they will never be able to get under control...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Native Auditing In Modern Relational Database Management

August 03, 2011 Added by:Alexander Rothacker

Modern databases provide powerful built-in auditing capabilities that are often underestimated. There are downsides of native auditing like the ability for a malicious user to manipulate the audit trail. Overall, this feature allows customers to monitor database activity at a very granular level...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Microsoft Database Tracks Laptops and Smart Phones

August 01, 2011 Added by:Headlines

The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...

Comments  (0)

972cda1e62b72640cb7ac702714a115f

Pastebin Security Risks: Monitoring with Rollyo Searchrolls

July 31, 2011 Added by:Kurt Aubuchon

You might want to keep an eye on the various pastebin sites for mentions of your organization's domain names, IP addresses, proprietary application names, or other info that could be evidence of problems. Unfortunately, keeping an eye on all the pastebins on the internet is difficult...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Data Thefts Surge Despite Increased Budgets

July 28, 2011 Added by:Headlines

"We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it a challenge for IT security teams to protect corporate data. Organizations must be able to proactively identify and mitigate security threats in real time..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Using DLP to Prevent Credit Card Breaches

July 09, 2011 Added by:Danny Lieberman

PCI DSS 2.0 does not require outbound, real time or any other kind of data loss monitoring. The phrases “real time” and “data loss” don’t appear in the standard. In an informal conversation with a PCI DSS official in the region, he confessed to not even being familiar with DLP...

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

Advanced Evasion Techniques

June 16, 2011 Added by:Rod MacPherson

Evasion techniques are not attacks on their own, but rather a sneaky way to get whatever attack you want to use past the network monitoring and policing systems to the target host. It's not about the bad-guy asking "How can I hack in?", but "How can I hack in without being seen?"

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How to Replace an Enterprise SIEM

May 18, 2011 Added by:Anton Chuvakin

Be prepared to keep the old SIEM running - without paying for the support contract, of course - or at least keep the old data backups – this becomes important if complete data migration is impossible due to architecture differences between the new and old SIEMs...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Loyalty Cards vs. Privacy Concerns

May 13, 2011 Added by:Allan Pratt, MBA

When stores or restaurants offer a loyalty card, in exchange, the customer is asked to provide name, telephone number, email address, snail mail address, and possibly other defining characteristics or shopping preferences. But what happens to my confidential information?

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

What Can We Learn From The Epsilon Breach?

May 02, 2011 Added by:PCI Guru

Epsilon appears to have caught this breach quickly because they were monitoring their network systems. What this incident points out is that even when you are monitoring your environment, it still takes a while to recognize that a breach is in progress...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hidden iOS File Records Tracking Information

April 21, 2011 Added by:Headlines

"Anyone who gains access to this single file could likely determine the location of the user's home, the businesses he frequents, the doctors he visits, the schools his children attend, and the trips he has taken over the past months or even a year..."

Comments  (2)

Page « < 3 - 4 - 5 - 6 - 7 > »