+ Post New Thread
Page 11 of 24 FirstFirst ... 9 10 11 12 13 21 ... LastLast
Threads 201 to 220 of 461

Forum: Network Security

Discussions and solutions for your network security.

  1. Algorithmic SIEM “Correlation” Is Back?

    One of the ways out of ill-fitting default rules is in use of event scoring algorithms and other ruleless methods. While not without known...

    Started by Raytan‎, 06-19-2011 01:12 PM
    • Replies: 0
    • Views: 4,842
    06-19-2011, 01:12 PM Go to last post
  2. Cynical Security Cliches

    Auditors are always trying to pin something on security departments. They’ll doggedly pursue every lead, using their statement of work as an...

    Started by Raytan‎, 06-18-2011 09:35 AM
    • Replies: 0
    • Views: 1,851
    06-18-2011, 09:35 AM Go to last post
  3. A Values-Based Approach to Your Compliance Program

    Moving from a rules-based compliance training to an ethics-based approach, there are three general areas where a company can change its approach in a...

    Started by Raytan‎, 06-18-2011 09:35 AM
    • Replies: 0
    • Views: 2,246
    06-18-2011, 09:35 AM Go to last post
  4. Get Digitally Secure Before it’s Mandatory

    It is possible to secure systems against most cybercrime but that level of security often proves too inconvenient for consumers. As long as banks...

    Started by Raytan‎, 06-17-2011 11:10 PM
    • Replies: 0
    • Views: 3,150
    06-17-2011, 11:10 PM Go to last post
  5. Richard Clarke: China's Cyberassault on America

    "What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a...

    Started by Raytan‎, 06-17-2011 10:07 PM
    • Replies: 0
    • Views: 1,353
    06-17-2011, 10:07 PM Go to last post
  6. USB Flash Drive Resurrection

    If you have not made file backups and you have important files on a USB, then you need to recover the files immediately, because most utilities that...

    Started by Raytan‎, 06-17-2011 08:40 PM
    • Replies: 0
    • Views: 1,485
    06-17-2011, 08:40 PM Go to last post
  7. SMBs Face Growing threat from Mass Meshing Attacks

    "Because they can do it at such a precise level, when they attack they don't just inject a single malicious script like in mass SQL injections. They...

    Started by Raytan‎, 06-17-2011 08:40 PM
    • Replies: 0
    • Views: 1,260
    06-17-2011, 08:40 PM Go to last post
  8. Introducing WPScan – A WordPress Security Scanner

    WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses in WordPress installations. Its...

    Started by Raytan‎, 06-17-2011 10:44 AM
    • Replies: 0
    • Views: 1,624
    06-17-2011, 10:44 AM Go to last post
  9. Cloud Computing, Security, and You

    There are many benefits of cloud computing, yet cloud computing also brings significant security concerns when moving critical applications and...

    Started by Raytan‎, 06-17-2011 10:44 AM
    • Replies: 0
    • Views: 1,328
    06-17-2011, 10:44 AM Go to last post
  10. Advanced Evasion Techniques

    Evasion techniques are not attacks on their own, but rather a sneaky way to get whatever attack you want to use past the network monitoring and...

    Started by Raytan‎, 06-17-2011 10:44 AM
    • Replies: 0
    • Views: 2,152
    06-17-2011, 10:44 AM Go to last post
  11. Citigroup Reveals More Compromised Client Accounts

    "The customers' account information (name, account number and contact information, including email address) was viewed. However, data that is...

    Started by Raytan‎, 06-16-2011 11:50 PM
    • Replies: 0
    • Views: 1,649
    06-16-2011, 11:50 PM Go to last post
  12. Years of Security Neglect - Solved in 24 Hours of Panic?

    It's been uncovered that your company is the next target of a hacktivist organization. Then panic sets in as everyone realizes the network that's...

    Started by Raytan‎, 06-16-2011 10:17 PM
    • Replies: 0
    • Views: 1,601
    06-16-2011, 10:17 PM Go to last post
  13. Fed CIO Vivek Kundra Leaves White House for Harvard

    "We are planning for a smooth transition, continuing these remarkable gains in changing the way the federal government manages IT and Vivek’s...

    Started by Raytan‎, 06-16-2011 10:17 PM
    • Replies: 0
    • Views: 1,386
    06-16-2011, 10:17 PM Go to last post
  14. HIPAA-HITECH Compliance: Two Free Webinars

    We have scheduled two new free webinars on HIPAA HITECH for Smarties. These webinars feature a presentation by Rebecca Herold,CIPP, CISSP, CISA,...

    Started by Raytan‎, 06-16-2011 10:17 PM
    • Replies: 0
    • Views: 1,480
    06-16-2011, 10:17 PM Go to last post
  15. LulzSec Attacks CIA Website, Taunts The Jester

    The hacker collective known as LulzSec conducted a successful attack against a public-facing website of the CIA on Wednesday. The DDoS attack, which...

    Started by Raytan‎, 06-16-2011 08:37 PM
    • Replies: 0
    • Views: 1,762
    06-16-2011, 08:37 PM Go to last post
  16. Anti-Hacker Kill Switch Voodoo Containment Systems

    Internet killswitches: Who needs them and why. It is rather ironic to even think about the United States attempting to carry out some form of...

    Started by Raytan‎, 06-16-2011 09:32 AM
    • Replies: 0
    • Views: 1,705
    06-16-2011, 09:32 AM Go to last post
  17. VoIP and PCI Compliance

    When you start talking to security people about VoIP security, their knee-jerk response is to tell you that VoIP is secured by the corporate...

    Started by Raytan‎, 06-16-2011 09:32 AM
    • Replies: 0
    • Views: 1,498
    06-16-2011, 09:32 AM Go to last post
  18. CIO: Throw Your Ego Out of the Window

    CIOs often don’t want to come out of their IT shell. Rather than thinking business, they get immersed into IT. Although a lot of CIOs do have those...

    Started by Raytan‎, 06-16-2011 09:32 AM
    • Replies: 0
    • Views: 1,490
    06-16-2011, 09:32 AM Go to last post
  19. FIPS 140-2: Just Buzzword Bingo?

    If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you...

    Started by Raytan‎, 06-15-2011 11:00 PM
    • Replies: 0
    • Views: 1,791
    06-15-2011, 11:00 PM Go to last post
  20. Project Cyber Dawn Explored Libyan Vulnerabilities

    The authors of Cyber Dawn argued that something similar to the Stuxnet attack on Iran could be done in Libya, noting that German engineering...

    Started by Raytan‎, 06-15-2011 11:00 PM
    • Replies: 0
    • Views: 1,860
    06-15-2011, 11:00 PM Go to last post

+ Post New Thread

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts