December, 2015

article thumbnail

OS X El Capitan: The smart person's guide

Tech Republic Security

This comprehensive guide includes everything you need to know about Apple's OS X El Capitan, including features, requirements, upgrade options, software updates, and more.

article thumbnail

The Importance of Technology Integration to the Value of an InfoSec product

NopSec

According to FireEye, a U.S. based provider of next generation threat protection, it takes companies, on average, more than 200 days to detect they are being hacked. Couple that result with the 2015 Verizon Data Breach Investigations Report that found 99.9 percent of vulnerabilities were exploited over a year since they were disclosed, and you can see that protecting data from hackers is in a sublime state of disrepair.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

article thumbnail

Criminal Services – Crypting

Digital Shadows

In the world of cybercrime, malicious software (malware) plays an important role. But if you’re a cybercriminal, how do you. The post Criminal Services – Crypting first appeared on Digital Shadows.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The TPP Agreement and Privacy

Privacy and Cybersecurity Law

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries […].

article thumbnail

Docker-based OpenVAS Scanning Cluster to Improve Scope Scalability

NopSec

OpenVAS (Open Vulnerability Assessment Scanner) – is an open source security vulnerability scanner and manager. It is an open source fork of the commercial vulnerability scanner Nessus and it provides several options to manage distributed, remote, local scans and add several other specialized vulnerability scanners to the mix. Since OpenVAS 8 was released with improved Master-Slave support for better distributed and load-balanced scanning, NopSec decided to build a proof of concept securit

More Trending

article thumbnail

Communicating Intelligence: The Challenge of Consumption

Digital Shadows

In my previous blog in this series I discussed the challenge of effectively communicating intelligence, and provided examples of how. The post Communicating Intelligence: The Challenge of Consumption first appeared on Digital Shadows.

40
article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.” In an age where data breaches crowd the daily headlines, lack of awareness is no longer an excuse for executives.

article thumbnail

Communicating Intelligence: Getting the message out

Digital Shadows

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll. The post Communicating Intelligence: Getting the message out first appeared on Digital Shadows.

40
article thumbnail

TalkTalk Information Likely to be Discoverable on The Dark Web

Digital Shadows

Last month, TalkTalk disclosed that they been the victim of a cyber attack on its website. Initial disclosures indicated that. The post TalkTalk Information Likely to be Discoverable on The Dark Web first appeared on Digital Shadows.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Communicating Intelligence: A Battle of Three Sides

Digital Shadows

Good intelligence depends in large measure on clear, concise writing. -Fran Moore, Director for Analysis, Central Intelligence Agency (2011) I’m. The post Communicating Intelligence: A Battle of Three Sides first appeared on Digital Shadows.

40
article thumbnail

EU Data Protection Reform: LIBE agrees!

Privacy and Cybersecurity Law

The EU Parliament LIBE Committee has approved the Data Protection Reform package as reported by Privacy Laws and Business today. For […].

40
article thumbnail

New guidance from the Polish DPA: a warning for all Safe Habor (ex)participants

Privacy and Cybersecurity Law

The Polish DPA has recently issued a statement to the effect that all companies which previously relied on Safe Harbor […].

40
article thumbnail

Safe Harbor fallout: where are we now?

Privacy and Cybersecurity Law

As we all know, the EU decided to invalidate Safe Harbor on 6 October 2015. Please see our Insight article […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Canada’s role in international botnet takedown

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has served its first warrant under Canada’s Anti-Spam Law (CASL) to take down […].