A couple of months ago I got invited to speak at ShowMeCon I based my talk how to relate building an IT security awareness program using the same tricks and mindset you would in in team strategy video games in a talk titled, Power-Ups and Princesses. My friend, Peter Zavlaris wrote an excellent piece on the RiskIQ blog. I recommend you check it out. Traditionally, the most formidable approach.
There has been a lot of publicity on Ransomware campaigns compromising various targets (I posted on CryptoLocker HERE and Ransomware spreading in the wild HERE). For those that don’t know what Ransomware is, its malware that encrypts your data and holds it ransom for a fee to unlock it. The cost to get your data back can be anything from hundreds to thousands of dollars. Plus you.
For those following Cisco security, you probably know Cisco acquired Sourcefire last year (more found HERE). The most anticipated release has been adding Sourcefire’s flagship Firepower offering inside Cisco’s most popular firewall offering the Adaptive Security Appliance (ASA). As of September 16th, this offering is officially available. You can find data sheets, configuration guides.
Security researcher, Stephane Schazelas found a major vulnerability that allows attackers to execute and run code in bash shell. A shell is found on most UNIX, Linux, and Mac operating systems. Users interact it with it thru the terminal program. It is the place to input and run commands for the operating system, as well as accept basic programming for the system. In other words, it is the.
The status quo approach of collecting more logs from more sources won’t help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM. Click here to download the free white paper (sponsored link).
A holistic security architecture – Attack Mitigation Network (AMN) – addresses these emerging security challenges offering the widest attack coverage and shortest time to mitigate. Download this white paper NOW to learn how to: Maintain business continuity even when under attack Interface with emerging security applications Protect against all types of availability-based threats Reduce.
Chase Cunningham – The Cynja, on Wednesday, 17 September 2014 wrote an article for Help Net Security around speaking inforsec with kids. As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet. As they.
My friend Peter Nicolas Zavlaris at RiskIQ posted a great blog. Check out the RiskIQ Blog. It is a great source around information and cyber security. By Peter Zavlaris As the Internet continues to take a public relations drubbing due to the constant cadence of data breach reports and instances of online fraud—it’s important to maintain perspective. Let’s face it, the Internet.
What is reputation? By definition “Reputation is the opinion (more technically, a social evaluation) of the group of entities toward a person, a group of people, or an organization on a certain criterion. It is an important factor in many fields, such as education, business, online communities or social status”. Older security technologies use signatures of known bad elements however.