The most recent content from our members.
In the earlier blogs of this series, we saw the snapshot of the SANS security survey showing how prepared organizations are in the methos of threat detection and response, and generating security reports. Now, we’ll see how organizations are equipped to collect security data and correlate that for threat intelligence. A…
Does NTA have any built in queries or user defined queries to detect security threats, or is it just LEM?
Adobe recently posted an announcement that urged all users to drop whatever they’re doing and update their Flash Players—immediately. This especially applies to those who visit Google Chrome and Internet Explorer. They further punctuated this warning by mentioning a vulnerability that could allow an attacker to remotely…
2014 is around the corner, and every organization is gearing up to face all the new types of threats, malware attacks, other cyber-crimes including data loss and identity theft which are getting more advanced and difficult to tackle. Let’s take a dive into what the industry experts are saying about the emergence of new…
Targeted attacks in general come with an intent to spy on confidential/sensitive business information such as financial information, proprietary product information and so on. Typically, a highly targeted attack like spear-phishing is targeted at an individual or an organization via emails that contain maliciously crafted…
Managing the IT infrastructure for your organisation and shielding your network against security threats can be a thankless job. It can require a lot of time and expertise. Below are some key pain points that IT professionals can face on a daily basis when trying to manage a secure network 1. Extracting useful information…
Alright, here’s the thing. Everyone in the IT security arena is talking about how to effectively shield your organization from threats. I recently saw researchers publishing their findings on security flaws with cheeky titles like “Did your HTTPs break?” Well, let’s get this straight – you can never be 100% secure. Say you…
There are many tools available to jailbreak Apple (iPods, iPads, iPhones) and root Android (Samsung phones, Amazon Kindles) products. As evidence of how easily a geek can perform these hacks, just look at the used electronics offered on CraigsList in a given week. In this era of ‘bring your own device’(BYOD), these…
You may have noticed a trend these past few weeks with my recent posts such as; Logging; Without a complete picture, what’s the point? Troubleshooting vs Compliance Security; Logging without borders? Are you Practicing Security Theater in IT Alright, sure you’ve noticed a trend, I’ve been talking a lot about logging, the…
It’s October!! STOP. THINK. CONNECT Yes, you are right, it is the National Cyber Security Awareness Month (NCSAM) This year, we are celebrating the 10th anniversary of NCSAM, which is sponsored by the Department of Homeland Security and the National Cyber Security Alliance. With the continuous advancement in technology,…
It looks like you're new here. Sign in or register to get started.