Profile

Cover photo
SearchMidmarketSecurity.com
69 followers|4,291 views
AboutPostsPhotosVideos

Stream

 
 
Breaches show information security fundamentals prove hard to learn http://ow.ly/2Me5Fs
Enterprise information security fundamentals are harder to master than it seems as highlighted by recent data breaches involving Community Health Systems UPS Supervalu and others
View original post
1
Add a comment...
 
What does the preliminary version of NIST Cybersecurity Framework offer?
The preliminary version of the NIST Cybersecurity Framework offers general critical infrastructure security best practices, but few specifics. A 45-day comment period will end in December 2013.
1
Add a comment...
 
Learn how to plan for cloud application security prior to a cloud application migration.
Learn how to plan for cloud application security prior to a cloud application migration. Performing an application profiling exercise prior to migrating legacy apps to the cloud is essential.
1
Add a comment...
 
Cigital CTO Gary McGraw distinguishes between cyberwar and cyberespionage.
In this video interview recorded at RSA Conference 2013, Cigital CTO Gary McGraw distinguishes between cyberwar and cyberespionage, two terms that are often used interchangeably.
1
Add a comment...
 
Peel back layers of network traffic with Security Onion
In this screencast, Keith Barker, CISSP and trainer for CBT Nuggets, provides a Security Onion tutorial, demonstrating how to analyze network traffic using Security Onion's tools.
1
Add a comment...
 
Unlock new pathways to network security architecture in this month's Information Security magazine
1
Add a comment...
Have them in circles
69 people
SearchSoftwareQuality.com's profile photo
TabletPCReview's profile photo
Chris Leonard's profile photo
Edizkan Ata's profile photo
SearchDisasterRecovery.com's profile photo
SearchSAP.com's profile photo
SearchSecurity.com's profile photo
SearchCRM.com's profile photo
SearchTelecom.com's profile photo
 
Are your iOS apps safe?
An iOS app vulnerability, present in many high-profile news apps, occurs due to a caching issue, according to the mobile security experts that discovered it.
1
Add a comment...
 
Ponemon report shows the cost enterprises pay to clean up after a cyberattack has increased 26% from 2012
The Ponemon Institute's fourth-annual report on the cost of cybercrime shows that sophisticated and frequent attacks are driving up attack resolution costs for enterprises in 2013.
1
Add a comment...
 
SureStart: An unconventional approach to safeguarding endpoint security.
HP has introduced a new security feature called SureStart that cryptographically verifies computers at boot time, rewriting the BIOS if it has been corrupted.
1
Add a comment...
 
Sandboxing: A key technology in advanced malware detection
Advanced malware detection products depend on sandboxing technology, even though it doesn't solve all security issues for enterprises. Expert Brad Casey discusses.
1
Add a comment...
 
Peel back layers of network traffic with Security Onion
In this screencast, Keith Barker, CISSP and trainer for CBT Nuggets, provides a Security Onion tutorial, demonstrating how to analyze network traffic using Security Onion's tools.
1
Add a comment...
 
The vast majority of users are still connecting via IPv4, but also have IPv6 enabled -- opening the door to man-in-the-middle attacks.
Neohapsis is creating public awareness of the dangers of having both IPv4 and IPv6 Internet protocols enabled because, in some situations, it enables man-in-the-middle-attacks.
1
Add a comment...
Story
Tagline
The latest updates and analysis on information security threats.
Introduction
SearchMidmarketSecurity.com is part of the TechTarget network of sites, offering midmarket information security news and analysis. We cover the latest anti-malware tools, risk management plans, network access tips and other strategies for protecting Microsoft Windows systems