Blog Posts Tagged with "Firewalls"

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

52ff7cf6fd88aebfb48b323e6251cd95

The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)

Default-avatar

NSS Labs' Defense In Depth Testing Reveals Weaknesses In Traditional Layered IT Security Strategies; No Clear And Present Winners

July 10, 2013 Added by:Joe Franscella

At the end of May, NSS Labs released its Correlation of Detection Failures report. In an accompanying news release, Are Security Professionals Overconfident in “Defense in Depth?”, the company said it was the culmination of a comprehensive in-lab test revealing that popular layered technology combinations are failing to protect organizations against exploits.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Lack of IT Readiness: The Security Edition

September 30, 2012 Added by:Rafal Los

Sticking to the basics wouldn't be such a bad thing in Security... if we had a clue on how to do the basics right. I know plenty of people who pentest all day every day and they'll be the first to tell you how easy it is to break in because defenses are so weak, if they exist at all...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Three Keys to Managing Firewalls for Better Security

September 25, 2012 Added by:Richard Stiennon

The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...

Comments  (1)

Ff632049ba1218ecd55b8122b2112642

The Best in Practice

September 12, 2012 Added by:Randall Frietzsche

If we are charged with designing, architecting, implementing, deploying, integrating, training and supporting security technology, processes and policies within our organization, we might discover that this work is really an art more than a science...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Terminal Services Attack Reductions Redux

September 10, 2012 Added by:Brent Huston

Our testing of the “rdp-sec-check” tool showed it to be quite useful in determining the configuration of exposed Terminal Services and in hardening them. Keep in mind, it is likely useful to harden the Terminal Services implementations internally to critical systems as well...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Vulnerability Intelligence versus Vulnerability Management

July 30, 2012 Added by:Richard Stiennon

Hardening systems is one of the most important things you can do counter targeted attacks, yet most organizations have yet to operationalize the process. I understand how hard -and expensive- it is. And it is easy for an analyst to wave the flag of “Patch now!” So forgive me for giving hard advice...

Comments  (1)

964eef19f95b77a2606d36daf6deb25f

Security is Your Responsibility When Using Free Wi-Fi

July 17, 2012 Added by:Dale Rapp

Free wireless hot spots deliver a high-speed internet connection, but this convenient no hassle access to the internet comes with a lack of security. This doesn't mean you should avoid accessing a free wireless hot spot, it just means you need to be aware of how to protect your device when you do...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Ten Things I’ve Learned About Cloud Security

July 17, 2012 Added by:Bill Mathews

Cloud security is tough for a lot of reasons, not least of which is because you probably only understand the basics of what you interface with - the controls the provider allows you to see. This lack of depth of management introduces many security related challenges. Having said that, let’s explore...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seventeen Percent of PCs Are Overtly Exposed

June 21, 2012 Added by:Robert Siciliano

If you are part of the 17% without security software installed, listen up: there are millions of viruses out there that will ravage your PC to death. Some can make your PC completely inoperable, while others allow criminals to control your PC remotely, making it part of a botnet, used for nefarious ends...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Increasing Logging Capabilities

June 21, 2012 Added by:Infosec Island Admin

System and network device logs provide valuable records of system activity. Logs may yield indicators of compromise, C2 communications, exfiltrated data, remote access logons, and other valuable data. Organizations should consider enabling the following types of logging...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Is There Such a Thing as Too Much Security?

June 18, 2012 Added by:Lee Munson

People who are in the computer security business are using too many scare tactics. Instead of informing the customer properly they are trying to scare them into using the company’s products. That is never a good thing and it is the reason why we have so much of a backlash going on now...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Post-Stuxnet: Siemens Improves ICS-SCADA Security

June 07, 2012 Added by:Headlines

"The introduction of our new Simatic CP and Scalance products only help to bolster Siemens' industrial security portfolio, but as we stress to our customers, there is no silver bullet to cybersecurity threats. Maintaining security is an ongoing process for plants and enterprises"...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

On Air Gaps and Killer Toothbrushes

May 28, 2012 Added by:Chris Blask

Air gaps do not and should not exist. Patching vulnerabilities won't make systems secure. Standards and regulations are here to stay. The threat will surpass our ability to tolerate it long before we can re-engineer and re-deploy every vulnerable system. These are all just facts...

Comments  (2)

Ebe141392ea3ebf96ba918c780ea1ebe

For Great Justice - I Mean Security...

May 22, 2012 Added by:Wendy Nather

Organizations that are IT-poor tend also to be security-poor because security becomes optional, a luxury and an omission for the small business that doesn't know it has something to lose -- or even if it does, it hasn't the faintest idea of how to address it...

Comments  (0)

Page « < 1 - 2 - 3 > »
Most Liked