France Finance

May 30 2018

Information Security information, news and tips, security work.#Security #work

Search Security

Security work

New Ragtime info implies NSA spying on Americans

Exposed data included new information on the NSA Ragtime intelligence gathering program, but it is unclear if the evidence proves Americans were targeted.

Hacker pleads guilty to Yahoo breach involvement

One of the Yahoo data breach hackers pleaded guilty to his involvement in the attack. Plus, the FBI failed to notify U.S. officials that they were targets of Fancy Bear, and more.

NSA ‘Red Disk’ leak includes Army INSCOM files

Yet another publicly accessible cloud storage bucket exposed government data; this time it was an NSA data leak which included information on an Army intelligence project.

Problem Solve

How private litigation can follow data breaches

Data breach litigation can be highly detrimental to an organization that just suffered a major security incident. Find out what kinds of legal action enterprises could face in the event of a data breach.

Security work

Security work

Your Guide to Info Sec Certifications

We’ve collected 30+ certifications for you. Which vendor-neutral and vendor-specific security certifications are best for you? Save time by downloading our list organized by experience level.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Trending Topics

Emerging threats Problem Solve

How to get around the built-in Windows firewall

Software developed by the hacking group Platinum takes advantage of Intel AMT to bypass the built-in Windows firewall. Expert Michael Cobb explains how it works.

Windows security Problem Solve

How attackers can bypass Microsoft PatchGuard

A technique known as the GhostHook attack can get around PatchGuard, but Microsoft hasn’t patched the flaw. Expert Michael Cobb explains why, as well as how the attack works.

PCI DSS News

Risk & Repeat: Does PCI DSS compliance matter?

In this week’s Risk & Repeat podcast, SearchSecurity editors discuss new research from Verizon on payment card security and the effectiveness of PCI DSS compliance for enterprises.

Encryption technology News

Risk & Repeat: Encryption under fire again

In this week’s Risk & Repeat podcast, SearchSecurity editors discuss the recent push from law enforcement officials for responsible encryption and what that may mean.

Security industry trends News

Jeremiah Grossman on cyberinsurance, warranties

Jeremiah Grossman, chief of security strategy at SentinelOne, talks with SearchSecurity about the science of developing a cyber warranty for threat detection products.

CISSP Get Started

How to improve password security and access control

Prevention is essential to protection against password attacks, unauthorized access and related threats. Expert Adam Gordon outlines how to proactively bolster your defenses.

Topics Covered

Data security technology and strategy (5) +
Enterprise identity and access management (8) +
Enterprise network security (9) +
Information security certifications, training and jobs (2) +
Information security program management (7) +
Information security risk management (3) +
Information security threats (5) +
Network threat detection (4) +
Platform security (3) +
Security audit, compliance and standards (4) +
Software and application security (9) +
Web security tools and best practices (3) +
Wireless and mobile security (4) +

Featured Authors

Security work

Michael Cobb

Security work

Alan R. Earls

Security work

Rob Wright

Security work

Kathleen Richards

Security work

Michael Heller

Security work

Marcus J. Ranum

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

Security work

What advice would you give to a company’s first CISO?

Security work

Are the penalties under the proposed Data Security and Breach Notification Act too harsh? Why or why not?

Security work

Is behavior analytics a separate component or feature of your current technology?

Find Solutions For Your Project

Evaluate

The risks of reviewing security source code

Tensions between the U.S. and Russia have led to source code reviews on security products, but the process isn’t new. Expert Michael Cobb explains what to know about these reviews.

Threat Forecasting
Tools for those seeking security for apps in the enterprise
Learn the principles and tools to make apps secure

Problem Solve

How attackers can bypass Microsoft PatchGuard

A technique known as the GhostHook attack can get around PatchGuard, but Microsoft hasn’t patched the flaw. Expert Michael Cobb explains why, as well as how the attack works.

How to get around the built-in Windows firewall
How private litigation can follow data breaches
Why a DDoS defense plan is necessary against an attack

Manage

Q ?>

Written by admin


Leave a Reply

Your email address will not be published. Required fields are marked *