freemium - News, Features, and Slideshows

News

  • The 2015 Social Engineering Survival Guide

    Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.

    George V. Hulme | 23 Jan | Read more

  • Top 5 skills needed for a SOC analyst

    Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. Of all the tasks you have to think about, finding and hiring a set of SOC analysts with the right skill set has to be a top priority.

    Rick Howard | 10 Mar | Read more

  • Zero-day attacks: How to fight back

    With cybercrime hitting more than 500 million victims globally and costing $100 billion annually, it's clear that security breaches are a problem very far from being solved. One particularly dangerous threat that doesn't seem to be getting its fair share of attention is zero-day attacks.

    Dirk A. D. Smith | 19 Aug | Read more

  • Why password-only authentication is passe

    The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.

    Bob Violino | 10 Jun | Read more

  • How to blunt spear phishing attacks

    According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to.

    Neal Weinberg | 06 Mar | Read more

  • Mobile device management -- what you should know

    One of the biggest technology trends this year has been the continuing influx of consumer-oriented into the workplace. From <a href="http://www.computerworld.com/s/article/9220934/Caution_iOS_5_iCloud_and_the_iPhone_4S_in_the_enterprise">iPads and iPhones</a> to Android phones and tablets, 2011 will go down as the year the consumerization of IT reached a critical mass. It's no longer a question of whether IT departments will support and embrace consumer-first devices, <a href="http://www.computerworld.com/s/article/9221289/IBM_opens_up_smartphone_tablet_support_for_its_workers">bring-your-own-device (BYOD) programs</a> and the expanded sphere of mobile platforms -- now, the issue is more about when and how.

    Ryan Faas | 09 Dec | Read more

  • Cisco how-to guides for firewalls, IPv6, contact centers and security exams

    If you're ready for a technical deep dive in a book, the Cisco Networking Technology Series provides that in its collection of volumes on topics that include Cisco firewalls, Cisco Unity Connection voice-messaging platform, Cisco Contact Center, <a href="http://www.networkworld.com/news/2009/073009-ipv6-guide.html">IPv6</a> and more. Here's a quick review of the books published in this series by Cisco Press this year.

    Ellen Messmer | 17 Nov | Read more

  • How to Be a Better Leader in a Disaster

    Linda Goodspeed, vice president of IT at Nissan North America, was attending a global IT meeting at her company's head office in Japan on March 11 and was caught in the magnitude 9.0 earthquake. The quake was among the top seven most powerful ever recorded and the strongest ever to hit the country. "People were diving under desks. Women were crying. We could see fire outside," she says. "Window blinds were moving three feet to the left and to the right. I thought the building would fall apart."

    Kim S. Nash | 30 Jun | Read more

  • HoneyPoint: Honeypot for Windows, Linux or Mac

    After over 10 years of active participation in the honeypot community, I was surprised not to have heard of MicroSolved's HoneyPoint Security Server before I started planning this roundup. HoneyPoint runs on Windows, Linux, and Mac OS X, and offers some useful features -- such as "defensive fuzzing" and the ability to track alert status -- that KFSensor and Honeyd don't. But HoneyPoint is neither as easy and complete as KFSensor, nor as flexible and scalable as Honeyd.

    Roger A. Grimes | 18 Nov | Read more