|
|
Wings Aggregator
Security RSS Feed Aggregator
We aggregate RSS feeds from a number of security related sites.
IoT security: Why it’s your biggest nightmare |
|---|
| CSO Online -- (added 2019-12-17 01:45:04) | The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models – and it also brings unprecedented security headaches.
|
How Virgin Hyperloop One protects its most precious data |
|---|
| CSO Online -- (added 2019-12-16 22:05:04) |
The concept of high-speed trains in low-pressure tubes has been around since 1799 when English inventor George Medhurst patented his “wind pump.†It’s only since Elon Musk took interest in the last ten years that the vision looks like it might become a reality. Musk released his Hyperloop Alpha white paper in 2013. In it, the Tesla and SpaceX founder envisioned a new form of high-speed magnetic levitation (maglev) rail system in near-vacuum tubes that could travel at speeds of over 700 mph. Rather than pursue the idea himself, Musk released the initial concept to the world and has let others take the initiative. To read this article in full, please click here (Insider Story)
|
"Penn Test" challenge helps infosec team think like attackers |
|---|
| CSO Online -- (added 2019-12-16 22:05:04) |
From the outside, a career in cybersecurity seems pretty damn sexy — all those hoodies and green Matrix characters streaming past in the background wherever you go, popping boxen, zero-days and exploits, APTs and hackers, oh my. The reality on the inside, of course, can seem more like accounting. The sometimes boring drudgery of security operations can be a drum beat of digital paper shuffling, SIEM alerts to wade through, security audits to perform, GRC (governance, risk and compliance) to manage. To read this article in full, please click here (Insider Story)
|
Best antivirus software: 12 top tools |
|---|
| CSO Online -- (added 2019-12-13 22:38:34) |
The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Five of the 16 products tested earned a perfect rating of 6 for each of those criteria:
- Bitdefender Endpoint Security
- Kaspersky Small Office Security
- Kaspersky Endpoint Security
- Symantec Endpoint Protection
- Symantec Endpoint Protection Cloud
The top 12 antivirus offerings shown here in alphabetical order scored at least 17.5 points out of a possible 18. You can drill down on the full results at The AV-TEST Institute's website. To read this article in full, please click here
|
What it takes to become a CISO |
|---|
| CSO Online -- (added 2019-12-13 22:38:34) | The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.
|
2020 cybersecurity trends: 9 threats to watch |
|---|
| CSO Online -- (added 2019-12-13 22:38:34) |
Making cybersecurity predictions is fun, but not necessarily helpful to security professionals who must decide which threats for which they should be the most prepared. “You can't really make a good prediction about what the future's going to hold because it's always the stuff that comes out of left field that really becomes the problem,†says Chad Seaman, senior engineer on Akamai's security intelligence response team.  If your biggest threat for 2020 is something new and unpredictable, how can you best focus your efforts in the coming year? Start by looking at how this year’s biggest threats are likely to change in 2020 in terms of scale and tactics. CSO has reviewed the leading research on the most common, significant threats of 2019 and asked those researchers for their advice on where those threats will trend and how organizations might adjust their defenses against them in 2020. Here’s what we learned. To read this article in full, please click here (Insider Story)
|
The CSO guide to top security conferences, 2019 |
|---|
| CSO Online -- (added 2019-12-13 22:38:34) |
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead. If keeping abreast of security trends and evolving threats is critical to your job — and we know it is — then attending some top-notch security conferences is on your must-do list for 2019 and 2020. From major events to those that are more narrowly focused, this list from the editors of CSO, will help you find the security conferences that matter the most to you. To read this article in full, please click here
|
How to secure your DNS traffic under Windows |
|---|
| CSO Online -- (added 2019-12-11 22:05:04) |
Domain Name System (DNS) is such a foundational function in Windows it is too often taken for granted. Think about ways to protect your firm’s DNS traffic both in terms of how attackers can impact your custom domain settings as well as protecting your workstations and providing more privacy. For example, I recently wanted to change a DNS setting in a network that I was managing. Since I hadn’t logged into the hosting company’s DNS manager for a long time, I couldn’t remember the password, nor where to log in to manage the settings. The account was so old that the password was set by the hosting company. To read this article in full, please click here (Insider Story)
|
Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves |
|---|
| CSO Online -- (added 2019-12-11 09:05:05) |
An undocumented feature in Intel CPUs allows attackers to manipulate the voltage of Intel CPUs to trigger computational faults in a controlled manner. This can be used to defeat the security guarantees of the Intel SGX trusted execution environment, which is meant to protect cryptographic secrets and to isolate sensitive code execution in memory.
The Intel Software Guard Extensions (SGX) is a technology present in modern Intel CPUs that allow users to set up so-called enclaves where the CPU encrypts part of the memory and doesn’t allow any programs except those running inside the enclave to access it. To read this article in full, please click here
|
The race for quantum-proof cryptography |
|---|
| CSO Online -- (added 2019-12-10 22:05:05) |
One of the biggest threats to privacy and national security is the ability of the immensely powerful quantum computers to break prevailing methods of encryption almost instantaneously. Once quantum computers become a reality, something that could conceivably happen in the next decade or two, all of the data protected by encrypted systems on the internet will become decrypted and unprotected, accessible to all individuals, organizations or nation-states. Dr. Jill Pipher, President of the American Mathematical Society, VP for Research, and Elisha Benjamin Andrews Professor of Mathematics at Brown University led a briefing last week for lawmakers on Capitol Hill called “No Longer Secure: Cryptography in the Quantum Era†about the threats that quantum computing poses to existing cryptographic systems that support national and economic security. Senator Jack Reed (D-RI) began the briefing by saying “we’re acutely aware of the potential advantages and disadvantages that quantum presents. And we’re also very concerned that some of our adversaries and competitors are investing a great deal in quantum computing.†To read this article in full, please click here
|
9 top fuzzing tools: Finding the weirdest application errors |
|---|
| CSO Online -- (added 2019-12-09 22:25:23) |
Don’t let the whimsical name fool you. Fuzzing is a serious process that can help uncover critical, unknown and sometimes weird problems affecting today’s modern, complex applications. Good fuzzing tools can often find hidden ways that programs can be exploited long before they are deployed to the public. How fuzz testing worksFuzz testing is an automated process that is almost always employed against completed code. This makes it similar to dynamic application security testing (DAST) tools, which also require programs to be fully compiled. However, DAST tools and fuzzing tools look for completely different things. A DAST tool will scan for vulnerabilities, such as the ability for hackers to use an app to make remote procedure calls or for weak protections surrounding exposed HTTP and HTML interfaces. Fuzzing tools, by contrast, provide unexpected input to an application to find out if doing so will generate weird or unintended results. To read this article in full, please click here (Insider Story)
|
How a nuclear plant got hacked |
|---|
| CSO Online -- (added 2019-12-09 22:25:23) |
If you think attacking civilian infrastructure is a war crime, you'd be right, but spies from countries around the world are fighting a silent, dirty war to pre-position themselves on civilian infrastructure — like energy-producing civilian nuclear plants — to be able to commit sabotage during a moment of geopolitical tension. What follows is an explanation of how India's Kudankulam Nuclear Power Plant (KNPP) got hacked — and how it could have been easily avoided.
The KNPP hack
The news came to light, as it so often does these days, on Twitter. Pukhraj Singh (@RungRage), a "noted cyber intelligence specialist" who was "instrumental in setting up of the cyber-warfare operations centre of the National Technical Research Organisation (NTRO),"Â according to The New Indian Express, tweeted: "So, it's public now. Domain controller-level access Kudankulam Nuclear Power Plant. The government was notified way back. Extremely mission-critical targets were hit," noting in a quote tweet that he was aware of the attack as early as September 7, 2019, calling it a "causus belli" (an attack sufficiently grave to provoke a war). To read this article in full, please click here
|
8 common pen testing mistakes and how to avoid them |
|---|
| CSO Online -- (added 2019-12-06 22:05:04) |
One of the most effective ways to uncover flaws and weaknesses in your security posture is to have a third party carry out planned attacks on your system. Penetration testing is all about exposing gaps in your defenses so that they can be plugged before someone with malicious intent can take advantage. There are several different types of pen test designed to target different aspects of your organization. From network infrastructure to applications to devices to employees, there are many potential avenues of attack for a criminal targeting your business. A good pen testing partner will approach the problem with an open mind and try to emulate a malicious hacker, probing for weaknesses, and trying various techniques and tools to breach your network. To read this article in full, please click here
|
IT certifications and training center |
|---|
| CSO Online -- (added 2019-12-06 10:20:04) | Certifications show that you’re committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.
|
Security Recruiter Directory |
|---|
| CSO Online -- (added 2019-12-05 23:05:04) |
Looking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and fill hard-to-hire positions in risk management, security operations, security engineering, compliance, application security, penetration testers, and computer forensics, among many others. If you're a security recruiting firm, we want your information! Our goal is to provide the most complete recruiter resource available, but to do that we need your assistance. Please send the name, contact info and a few sentences about your company and its specialties to Michael Nadeau. To read this article in full, please click here
|
What is cybersecurity? Definition, frameworks, jobs, and salaries |
|---|
| CSO Online -- (added 2019-12-05 22:20:04) |
Cybersecurity definition
Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. It is often contrasted with physical security, which is the more traditional security practice aimed at controlling access to buildings and other objects in the real world. Although there are plenty of high-tech physical security techniques, and sometimes physical and cybersecurity are joined together in the org chart under the same executive, cybersecurity focuses on protecting assets from malicious logins and code, not burglaries. To read this article in full, please click here
|
4 authentication use cases: Which protocol to use? |
|---|
| CSO Online -- (added 2019-12-05 22:20:04) |
Whether you host your authentication system internally or externally, you need to select an authentication protocol carefully. The correct protocol for your use case will allow the overall system to operate securely with minimal effort and enable future expansion and compatibility with standards. In addition, if you want to make your users’ identities available to external services, it is important to consider how easy it is for these services to consume that data while keeping the process secure.
|
How to manage Windows 10 1903 and 1909 security updates |
|---|
| CSO Online -- (added 2019-12-04 22:05:05) |
With the Windows 10 1909 release, Microsoft announced that System Center Configuration Manager (SCCM) and the Microsoft Intune mobile management service will be combined under the name of Microsoft Endpoint Manager. It might be time to revisit how you control updating in Windows 10 and what you use to do it. |
Why BT's red team strikes for real |
|---|
| CSO Online -- (added 2019-12-04 19:05:05) |
While it was a Prussian general who said it first, Mike Tyson said it best: “Everyone has a plan until they get punched in the mouth.†Incident simulations, war games and tabletop exercises can go a long way to prepare the business and security teams for the worst, but there’s nothing like a trial by fire. As part of its proactive approach to defense, UK-based BT allows its red teams to attack live systems without informing the rest of the business or the blue team defending it. These live exercises test the real-world abilities of both teams and inform the company’s defenses going forward. To read this article in full, please click here (Insider Story)
|
CSO Hall of Fame honorees |
|---|
| CSO Online -- (added 2019-12-04 03:45:04) |
The CSO Hall of Fame was created to spotlight outstanding leaders who have significantly contributed to the advancement of information risk management and security. Selected by the editors of CSO, its advisors and executives, the individuals in this inaugural class of the CSO Hall of Fame exemplify leadership excellence and, by their example, contribute to the improvement of security across all organizations. Honorees will be recognized at the CSO50 Conference + Awards taking place April 27 - 29, 2020 at the JW Marriott Camelback Inn Resort in Scottsdale, AZ. The annual conference draws 200+ security decision-makers for three days of peer interaction, education and engagement, and culminates in an awards ceremony recognizing the winners of our annual CSO50 awards and Hall of Fame inductees. Attendees travel from across the U.S. to learn from industry experts and top vendors as they seek out information on security solutions and best practices. To read this article in full, please click here
|
How to evaluate a CASB |
|---|
| CSO Online -- (added 2019-12-03 22:20:05) |
Evaluating cloud access security broker (CASB) products can be a challenge. Although they all share core functionality, each has its own unique overall feature mix. Understanding those features and how they work will make it easier to know which ones should be on your short list. What follows is an explanation of the core functions CASBs share and the other features you might find. This will help you decide what your expectations should be and understand the issues involved in making your purchase decision. Â Core CASB services
If you have a mixture of cloud and on-premises equipment, a CASB is certainly in your future. The sooner you deploy one the better. The following three basic services that all CASBs offer are at the core of what CASBs do and why you would buy one:Â To read this article in full, please click here (Insider Story)
|
CrowdStrike, Ukraine, and the DNC server: Timeline and facts |
|---|
| CSO Online -- (added 2019-12-03 22:20:05) |
President Donald Trump, Senator John Kennedy from Louisiana and Secretary of State Mike Pompeo have all given credence to what cybersecurity experts and the US intelligence community deride as a baseless conspiracy theory pushed by Russia. That theory posits that Ukraine, and not Russia, was responsible for hacking into the networks of the Democratic National Committee (DNC) in the run-up to the 2016 presidential election.
Kennedy quickly backtracked from blaming Ukraine for the DNC hack, but nonetheless left wiggle room to return to this contention. After admitting he was “wrong†to imply Ukraine and not Russia hacked the DNC, he went on to say, “There is a lot of evidence, proven and unproven — everyone’s got an opinion — that Ukraine did try to interfere, along with Russia and probably others, in the 2016 election.†To read this article in full, please click here
|
Flex streamlines app access for 20k suppliers with IAM overhaul |
|---|
| CSO Online -- (added 2019-12-02 22:05:04) |
As a contract manufacturer for over 1,000 customers, including some of the world's largest technology companies, Flex Ltd a few years ago needed a more secure way to manage supplier access to its systems. The company's thousands of supply chain partners, scattered around the globe, ranged in size from tiny mom-and-pop outfits with little more than a Gmail address to large global companies. Many used multiple accounts and systems for accessing apps at Flex and the company had no centralized way to manage passwords or for provisioning and de-provisioning supplier access to its network. Flex's ability to detect suspicious and abnormal activity was also limited because of the highly distributed nature of its identity and access environment for suppliers. To read this article in full, please click here (Insider Story)
|
What it takes to be an interim CISO |
|---|
| CSO Online -- (added 2019-11-29 22:05:04) |
Whether interim or virtual, non-permanent CISO roles are becoming more common. They help fill a gap for companies unsure of, or unable to find, what they need on a permanent basis and offer benefits to experienced security professionals who want more variety in their role. These temporary roles offer many of the same challenges faced by permanent CISOs, but also offer unique challenges for those taking up the position and require additional skills and traits. The role of the interim CISO
Four percent of UK companies are outsourcing the top security role to a virtual CISO (vCISO), CISO-as-a-service, or another third-party organization, according to CIO UK's 2019 CIO 100 survey, twice as many as the year before. A recent ESG survey suggested non-permanent CISO roles are becoming more appealing to professionals with 21% of those surveyed saying they are considering taking such a position. A further 33% are open to becoming a virtual CISO in the future. To read this article in full, please click here (Insider Story)
|
Data breached in translation |
|---|
| CSO Online -- (added 2019-11-27 23:45:04) |
Before September, translation didn’t matter — at least, from an infosec standpoint. Taking content written in one language and changing it to another wasn’t at the top of most CSOs’ lists of data risks. Then Norwegian news network NRK uncovered a breach at Statoil, one of the world’s biggest oil and gas companies. NRK reports that the $46 billion business used Translate.com, a free online tool, to translate “notices of dismissal, plans of workforce reductions and outsourcing, passwords, code information, and contracts.†Then, the story continued, Lise Lyngsnes Randeberg, a college professor, Googled Statoil: In her results were the company’s translations. To read this article in full, please click here (Insider Story)
|
Has the quantum crypto break already happened? |
|---|
| CSO Online -- (added 2019-11-27 00:35:05) | Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.
|
|