Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
16 Best Password Manager Apps for Your Small Business
01/30/2018

If you are thinking about making use of the different password managers available, take a look at the following 16 best password manager apps for your small business.

complete article

Super Bowl brings massive security resources to Minneapolis
01/28/2018

Concrete barriers and chain-link fencing are going up around the site of the Super Bowl in downtown Minneapolis, where a contingent of local, state and national agencies is working to ensure that the game and dozens of related events are safe.

The downtown location of the Feb. 4 title game has presented challenges for authorities, who have had to get creative as they carved a secure perimeter around businesses and a major hospital near U.S. Bank Stadium. But it's not the first time the Super Bowl has dealt with the challenges of a city center, and authorities who have spent roughly two years thinking about every possible scenario say they are prepared.

What is cyber security? How to build a cyber security strategy
01/24/2018

Cyber security is the practice of ensuring the integrity, confidentiality and availability (ICA) of information. It represents the ability to defend against and recover from accidents like hard drive failures or power outages, and from attacks by adversaries. The latter includes everyone from script kiddies to hackers and criminal groups capable of executing advanced persistent threats (APTs), and they pose serious threats to the enterprise. Business continuity and disaster recovery planning are every bit as critical to cyber security as application and network security.

Cybersecurity important for businesses
01/22/2018

Broadband and information technology are powerful tools for small businesses. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers and their data.

Using AI intelligently in cyber security
01/19/2018

Bold claims have been made about the potential for cyber security solutions to detect and block attacks with little to no human involvement. During the last 12 months in particular the volume has been turned up on the potential of increased AI and automation helping to win the ongoing battle against cybercrime.

What AI has to offer is undoubtedly impressive, but it should not be taken as an indication that AI can be left to its own devices, fixing problems and eliminating threats without us lifting a finger.

Killer Sex Robots in the Future?
01/17/2018

Sex robots could be hijacked by hackers and used to cause harm or even kill people, a cybersecurity expert has warned.

Artificial intelligence researchers have consistently warned of the security risks posed by internet-connected robots, with hundreds recently calling on governments to ban weaponized robots.

Top Security Challenges for 2018
01/15/2018

In 2018, we anticipate that cybercriminals will look to target and exploit more security software.

Companies are publicly touting their GDPR readiness, but behind closed doors, I expect a lot of uncertainty about the ability to comply with these new and incredibly strict guidelines.

Criminal organizations will continue their ongoing development and become increasingly more sophisticated.

Even though the majority of cyber incidents are still motivated by espionage or criminal activity, more destructive attacks fueled by masquerading tools, especially by nation-state actors, will be an alarming and growing trend in 2018.

4 Keys to an Effective BYOD Mobile Security Policy
01/12/2018

Most organizations have allowed employee mobile devices to become key parts of their IT infrastructure, whether they formally acknowledge it or not. Here are four ways companies can revisit their mobile security policy to acknowledge the role of Bring Your Own Device (BYOD) in enterprise security management, mitigating the risks while still providing employees flexibility and freedom.

1. Recognize Employee-Owned Devices
2. Revisit Heavyweight EMM Strategies
3. Use the Cloud and Containers to Solve Security Problems
4. Focus on the Greatest Risks and Provide Feedback

10 Cybersecurity Trends: What to Expect in 2018
01/02/2018

1. More Big, Bad Breaches
2. More Poor Security Practices
3. More Endpoint Security Woes
4. More Takedowns
5. More Bitcoin Heists
6. More Extortion Shakedowns
7. Online Proxy Wars
8. Market Consolidation
9. More EU Breach Notifications
10. GDPR Fines

Database Security Market by Software, Service, Business Function, Deployment, Organization Size, and Vertical - Global Forecast to 2022 - Research and Markets
01/10/2018

The global database security market size is expected to grow from USD 2.95 billion in 2017 to USD 7.01 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 18.9% during the forecast period.

The database security market is driven by rising threats including SQL injection, Denial of Service (DoS) attacks, and malware attacks.

Growing demand for sophisticated security solutions and evolving regulatory landscapes are driving the database security market. However, limited security budgets and high installation cost of solutions may restrain the growth of database security market.

Database encryption is one of the crucial solutions for securing the database. The database encryption can be done in 2 ways: encryption of data at rest and encryption of data in transit with better authentication control. Vendors in the market offer various encryption solutions to protect sensitive business data from both insiders as well as outsiders.

Cybersecurity Predictions for 2018
01/08/2018

There will be at least one large-scale data breach, if not more. Just as 2017 brought us the Yahoo breach and the massive Equifax losses, there is no reason at all–none–to think 2018 will be any safer. While we can’t say exactly who will be the victim, we can say with confidence that data breaches do not fundamentally change anything. Corporate behavior is unaffected and consumers quickly internalize the costs.

The U.S. Department of Homeland Security will finally get a cybersecurity leader for the National Protection and Programs Directorate. It’s only been a year.

No significant federal effort will be made to protect the cybersecurity of the 2018 election. As long as executive branch leadership holds the official view that no Russian interference occurred in 2016, there is little reason to expect the federal government will take action. As a result, there will be serious questions about the integrity of the 2018 elections.

There will be a significant disruption of internet traffic caused by a botnet attack. Service will be blacked out and messages will be diverted. The disruption will last more than an hour.

Pressure on social media organizations to monitor content will grow significantly. The restrictions will start with efforts to protect against sex trafficking. Silicon Valleys obtuseness to the nature of their influence will leads to calls for regulation. In response, they will engage in much greater self-censorship. Free speech will suffer.

Startup Is Using Blockchain Tech To Rethink Cyber Security In The Bitcoin Era
01/05/2018

Paul Puey serves as the CEO of Edge, a cyber security company that empowers individuals to take control of their own online data by developing the proprietary tools, software and systems needed to keep their information tightly secured.

Experts argue that secure information should be housed at the edge of a network rather than in a centralized location. Following this approach, instead of relying on enterprise server security, edge-security first encrypts data from the user's device before it ever touches a network or server.

2018 ushered in with tight security across U.S.
01/03/2018

As millions in the U.S. prepared to ring in 2018, there had already been massive celebrations around the world. In Sydney, Australia, a huge fireworks display lit up the harbor. In Hong Kong, a spectacular array of pyrotechnics wowed spectators. And in Dubai, an amazing light show on the side of the world's tallest building, the Burj Khalifa, welcomed the new year.



Current Blog

2018

January Archive

2017
Nov/December Archive

October Archive

September Archive
August Archive
April Archive
March Archive

February Archive
January Archive

2016 Security Blog Archive
November /December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.