Advertisement
Top

Tag: measures


Network security

Nearly half of organizations lack the necessary talent to maintain security measures

March 20, 2019

Via: Help Net Security

Regardless of their size, organizations share a common challenge: IT security teams are understaffed and overextended. The number of security alerts, the challenge of what to prioritize, and the shortage of expertise can be overwhelming and introduce risk. The Trend […]


Network security

Guidelines for assessing ISPs’ security measures in the context of net neutrality

December 13, 2018

Via: Help Net Security

According to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all internet traffic to and from their customers equally. Security measures, like blocking traffic on certain ports, are […]


Network security

4 Practical Measures to Improve Election Security Now

September 12, 2018

Via: Dark Reading

It’s more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage. In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout […]


Cyber warfare

What to do after recovering from a cyberattack

February 24, 2017

Via: Malwarebytes

More companies are falling victim to cyberattacks, as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it […]


Hacker

Ohio using National Guard cybersecurity team to protect elections

November 4, 2016

Via: The Hill

Ohio’s secretary of state will use the National Guard’s cybersecurity team to bolster its election systems, The Associated Press is reporting. Jon Husted, a Republican, will also take advantage of the FBI, the Department of Homeland Security and private security […]


Data loss, Editorial

Once breached, repeatedly breached – how to stop data loss

October 5, 2016

Via: Russel Edwards

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ […]


Data loss, Privacy protection, Security

Think changing your Yahoo password is enough? Think again…

September 30, 2016

Via: TrendMicro Blog

With the recent announcement of more than 500 million accounts impacted by a security breach, many Yahoo users have been changing their passwords. After all, that’s the official guidance. However, as ZDI’s Simon Zuckerbraun points out, a new password isn’t enough. […]


Cyber warfare

It takes a planet: Why international cyber security cooperation is more important than ever

August 12, 2016

Via: TrendMicro Blog

In many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web users, and edited in real time. Events that occur on one […]


Vulnerabilities

Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

June 29, 2016

Via: Security Intelligence

In the U.S., the transportation sector is defined to include a number of sub-sectors such as aviation, highway infrastructure, maritime transportation, mass transit and passenger rail, pipeline systems, freight rail, and postal and shipping. This is an extensive network of […]


Cyber warfare, Editorial

Help improve safety in case of power grid cyber-attacks!

June 15, 2016

Via: Russel Edwards

The December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via […]


Privacy protection

What to do for privacy after Safe Harbor? Syncplicity has an idea

November 11, 2015

Via: CSO Online

Data privacy law is murky since Europe’s highest court struck down the Safe Harbor agreement long used between the U.S. and Europe. Some cloud storage vendors now plan to help enterprises adjust to the new reality. Last week, Amazon announced […]


Access control, Editorial, Security

Air gapped computers – security issues

August 12, 2015

Via: Russel Edwards

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to […]