News

12/12/2011 15:25

Majority of privileged users get access to more than they should

More than half of IT managers said that they are likely to be provided with access to restricted confidential information beyond the requirements of their position, according to a Ponemon Institute survey commissioned by HP.  A full 61% of those surveyed reported that privileged users...

Read more

—————

12/05/2011 07:59

Executives Lack Confidence in Infosec Strategies

The opportunity for cyber attacks grows daily as these corporations and governments continue to amass information about individuals in complex networks across the Web. At the same time new generations of cyber activists, some motivated purely by money and others by the desire to expose and...

Read more

—————

12/01/2011 15:27

Cyber security trends for financial services in 2012

Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services cyber security trends that will make 2012 a pivotal year for banks and investment firms as they try to stay ahead of the IT...

Read more

—————

11/14/2011 13:53

How to Avoid the Most Common and Dangerous Passwords

Passwords is generally the first layer of security and authentication, password cracking techniques are very common the best techniques are guessing, dictionary based attack, brute force attack. If your password is easy than a hacker or cracker can easily hack it by using guessing or other...

Read more

—————

11/07/2011 09:17

Raise Your Company's Enterprise Risk Management IQ

There’s a lot of discussion these days about security intelligence—specifically, how to improve risk and compliance business processes. A lack of security data isn’t the issue. In fact, the problem is too much data and not enough usable information. Siloed security information, fragmented data...

Read more

—————

10/31/2011 15:22

3rd parties tend to duck responsibility when they lose your data

Organizations often end up paying the consequential costs of data breaches when third-party vendor contracts aren't scrutinized https://www.darkreading.com/database-security/167901020/security/news/231901918/don-t-let-your-suppliers-limit-too-much-breach-liability.html?itc=edit_stub The...

Read more

—————

10/26/2011 10:06

Breach Diaries

Three real-life security pros -- Greg Shipley, Tyler Allison, and Tom Wabiszczewicz -- discuss five lessons learned from the front lines of today's major data thefts.   https://reports.informationweek.com/abstract/21/1231/Security/breach-diaries.html   It's 10:00. Do you know...

Read more

—————

10/19/2011 13:00

You've Been Hacked. Now What?

You’ve known all along, and on your way to work (the longest drive of your life), you finally admit it: you’ve been hacked. How is this possible? You’ve had all the training. You made sure your employees were checked and double-checked. You have gone from a posted sign at the entrance...

Read more

—————

10/12/2011 10:51

List of Open Source Web Application Firewalls!

A web application firewall (WAF) is an appliance, server plugin, or a software filter that applies a set of rules to an HTTP conversation. It typically acts as a countermeasure over common attacks such as Cross-site Scripting (XSS), Cross Site Request Forgery (CSRF) and SQL...

Read more

—————

10/06/2011 06:52

ISACA put out a great white paper on just what is application security.

https://www.isaca.org/Knowledge-Center/Research/Documents/Web_App_Sec_WP.pdf?id=

Read more

—————


Contact

Aces Infosec

A WNY company

716-775-6367