Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
The Security Struggle Is Real In Health Care
07/29/2015

The cybercrime trend has reached new heights in the past few years, with hackers and other threats successfully breaking into the storage systems, networks and devices of organizations in virtually every industry. By one measure, it might seem as though retail is the single worst performer in this particular arena, with some of the largest breaches striking that industry with some consistency since 2012.

Phone Authentication
07/27/2015

The phone-based authentication market will undergo a pronounced growth trend over the next several years, according to a new report from Technavio. The firm predicts an annual growth rate of 49.33 percent between 2014 and 2019.

3 Ways To Make Mobile Security As Easy As Hitting The Like Button
07/24/2015

In just five years, employees who were born between 1981 and 2000 will make up a whopping 50 percent of the workforce. Known for their comfort with and high expectations of technology, the millennial generation grew up alongside the coming-of-age of the internet, social media, mobile, e-commerce, the birth of email and other ways of instant, digital file sharing services, such as Napster and BitTorrent.

Data Security Breach
07/22/2015

Home Depot was recently hit with a books-and-records suit in the Delaware Court of Chancery, Frohman v. Home Depot, which seeks documents relating to the giant retailers data security breach last September.  The plaintiff, a Home Depot shareholder, is requesting information concerning how the company first learned of the breach, any analysis of how the breach occurred, and what steps it took thereafter, among other topics.

Einstein Hack
07/20/2015

A federal security system that failed to prevent millions of sensitive files on government employees from being improperly accessed has been plagued by delays and is largely unable to stop the most sophisticated attacks, current and former U.S. officials said.

The security system in place at the Office of Personnel Management, known as Einstein, is incapable in most cases of stopping previously unknown malware from penetrating government networks. I

Another vulnerability of Einstein, which is used by most government agencies, is that it does little to stop people from breaking into government networks using stolen login credentials, current and former U.S. officials said. Recorded Future, a Massachusetts Internet technology company, has found stolen login credentials available online for roughly 50 federal agencies, including the Office of Personnel Management.

Mobile Security
07/17/2015

Enterprises build and deploy mobile apps for lots of reasons. Some apps are the product the enterprise sells. Some apps are helping staff perform internal processes. Other apps are slightly customised versions of commercial products, tailored for the enterprises needs.

In any of these situations, mobile apps have security concerns that other forms of software lack. You need to be aware of these three risks.
1: App store delays affect your security response times
2: Third-party libraries can create a privacy liability
3: Shifting sands of third-party code

Federal Database Security
07/15/2015

Even after the damaging intrusion, believed to be from China and possibly affecting well over 18 million people, officials say the government is still struggling to fix the problem.

Legislation passed last December is pushing agencies to address the issue, but networks remain vulnerable in the meantime.

Broncos Deploy Security Technology
07/13/2015

Alarms went off when The New York Times recently reported that the St. Louis Cardinals were being investigated by the FBI and Justice Department for allegedly infiltrating the Houston Astros' internal network to steal information about players and trades.

The Broncos, perhaps one of the most advanced professional sports teams with regard to adoption of new technologies and adherence to security policies, have long been aware of the threats. And over the years, the team has taken steps to try to close as many of those loopholes as possible to secure proprietary information.

Cyber Attack Reveals Weakness in Government Security
07/10/2015

The concept of a cyberwar is no longer relegated to the pages of science fiction. Many states may have already built weapons to fight this war, and the U.S. government is working to secure online resources to protect against cyber attacks. However, attacks are still slipping through, including a recent attack on U.S. Office of Personnel Management, that may have exposed the data of millions.

Car Hacking
07/08/2015

The National Highway Traffic Safety Administration is accelerating its efforts to mandate vehicle-to-vehicle communications, a step that could help lower the number of traffic deaths in the U.S., but also creates a major challenge for data security and privacy.

NHTSA plans to submit a proposed connected car rule by the end of the year. New cars equipped with the communications technology could hit the market by the early 2020s, the Transportation Department estimates. The technology could have great public benefits, potentially reducing the 30,000-plus crash related deaths that occur in the U.S. every year. But the technology would emit a stream of data broadcasting the location of millions of cars, a potential security dilemma.

A group of eight automakers already has put years of work into developing an unprecedented system to manage such risks. The system is a form of so-called public key infrastructure, which employs encryption and authentication and is widely used by online shopping sites and banks. The idea is to let two vehicles that have no existing relationship securely exchange data.

Hacking
07/07/2015

Hackers and other computer experts sounded alarms as the World Wide Web brought the transformative power of computer networking to the masses. This created a universe of risks for users and the critical real-world systems, such as power plants, rapidly going online as well.

Officials in Washington and throughout the world failed to forcefully address these problems as trouble spread across cyberspace, a vast new frontier of opportunity and lawlessness.

Cyber Security Insurance
07/06/2015

A robust cyber security insurance policy can be tricky to procure, even for the most meticulous wealth management firms.

Interest in cyber insurance has surged over the past year following a number of high-profile hackings, including one announced earlier this month involving the U.S. Office of Personnel Management.

In response, many industries and the financial services industry in particular, have stepped up their vigilance against cyber crimes.


Last year, financial institutions raised by nearly 20 percent the total limits of their cyber coverage with Marsh, a global insurance broker and unit of Marsh & McLennan Cos, to an average of $23.5 million.

Banks Slacking on Web Security
07/03/2015

Nearly every major bank is using second-rate security to guard its website.

Capital One, JPMorgan Chase, Suntrust, Wells Fargo -- none of them use what is commonly referred to as the best practice in the industry when it comes to Web security.

The worst offenders are HSBC and TD Bank. Their homepages do not even secure private connections with customers, who might be unwittingly logging into fake websites run by cyberthieves.

The only banks that do it right? BNY Mellon (BK) and PNC (PNC).



Current Blog

2015 Security Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.