Articles
  • What’s the state of your software?

    Chris Wysopal, CTO and CISO at Veracode, the application security specialists, looks at the global threat of application security and why businesses need to know where they stand.

  • User behavior analytics for security operations efficiency

    So, you’ve been informed by the FBI, a business partner, or security consultant that they have spotted a bunch of your company’s employee records on the paste bin website. Your first thought - this is obviously the result of a data breach due to unauthorized access.

    This scenario is repeated over and over again and is continuously seen in the headlines. The company names mentioned are likely only the tip of a much larger iceberg. Multiple surveys and case studies tell us that the average time to detection of targeted attacks – those that involve stolen credentials and user impersonation – is greater than 200 days. That’s how long the attacker is able to stay resident inside the network without detection. What there isn’t as much discussion about is the time it takes to figure out the path the attacker took through the IT environment once you know you’re the subject of this kind of attack. This time-line intersection of identity, assets and security alerts represent what’s best known as the attack chain.

  • Sun Tzu 2.0: Is cyberwar the new warfare?

    For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks that provide users with a wealth of information, transactional services and the like have also been used as a battlefield to disrupt our everyday lifestyle. From obtaining general information to managing online financial portfolios to purchasing flight tickets, there has been a groundswell of disruption to access these channels.

  • Automated threat management: No signature required

    The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only designed to recognize threats that have been previously seen. This means someone needs to be the first victim, and everyone hopes it’s not them.

    We keep doing the same thing over and over, expecting different results. The security industry has put a massive effort into delivering signatures faster and faster, trying to close the gap between when a new threat is detected to when the corresponding new signature is delivered.

  • Internet of Things: Bracing for the data flood

    There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer services. How will those services work within the context of the IoT? Can they support the proliferation of potential connection points? Do we understand how they might respond when they need to deal with the complexity of management of so many users and devices? And perhaps most importantly, can those systems, and the security processes around them, cope with the explosion in raw data?

  • Three steps to a successful cloud migration

    People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use. This stockpile adds up, and when it comes time to move, you have no idea what you have packed away behind closed doors.

    The same notion rings true for the data collected at your company, except you must consider privacy and safety concerns as you pack. While the movement toward the cloud provides an opportunity to eliminate the expense of on-premises server maintenance, assessing your information prior to migration is essential to ensure that you are adhering to compliance regulations, retaining and classifying information, and enforcing the specific policies of your organization.

  • A data security guy's musings on the OPM data breach train wreck

    Despite all the media attention to breaches, there is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with protecting, it should have had state-of-the-art data protection, but instead it has become the poster child for IT Security neglect. While it's dismal security posture is unjustifiable, the people and process challenges that hindered the implementation of appropriate security measures are pervasive.

  • Why cloud business continuity is critical for your organization

    Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders. Many see it as a responsibility of their IT teams, and think no more of it. However, this is a dangerous abrogation of responsibility, as any CEO who has suffered through a prolonged systems outage can vouch for.

  • The challenges of implementing tokenization in a medium-sized enterprise

    We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary target was Social Security Numbers (SSN) and other Personal Identifying Information (PII). Criminals typically started by stealing data from smaller, less protected organizations and then used that data to attack larger but better protected organizations.

  • Passwords are not treated as critical to security

    A steady drumbeat of high visibility security breaches caused by insecure passwords continuously demonstrate the fallibility of inadequate password management. Passwords continue to be a critical part of security policy in most organizations, which is why it’s confounding that many employees are still allowed to set their own passwords for corporate assets. If we are honest with ourselves and aware of human limitations, we shouldn’t rely on human users to choose a properly complex password for our most sensitive accounts.

Videos      Podcasts



Spotlight

Microsoft Edge: New browser, new risks for Windows 10

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Aug 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //