Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Rise in Security Breaches
05/20/2015

The current high level of security breaches, from the largest organization down to the smallest, will continue unabated. What will also grow in 2015 will be the acceptance that security breaches are pretty well unavoidable for the majority of organizations. Companies will need to change their approach to security in order to reflect this. Security spending will continue to increase, with spending growth higher on asset security over perimeter security.

5 Security Tips
05/19/2015

Encrypt your data: Stored data, filesystems, and across-the-wire transfers all need to be encrypted. Encryption is essential to protecting sensitive data and to help prevent data loss due to theft or equipment loss.

Use digital certificates to sign all of your sites: Save your certificates to hardware devices such as routers or load balancers and not on the web server as is traditionally done. Obtain your certificates from one of the trusted authorities.

Implement DLP and auditing: Use data loss prevention and file auditing to monitor, alert, identify, and block the flow of data into and out of your network.

Implement a removable media policy: Restrict the use of USB drives, external hard disks, thumb drives, external DVD writers, and any writeable media. These devices facilitate security breaches coming into or leaving your network.

Secure websites against MITM and malware infections: Use SSL, scan your website daily for malware, set the Secure flag for all session cookies, use SSL certificates with Extended Validation.

Security Fear Is it a Motivator?
05/18/2015

As security breaches increasingly make headlines, thousands of Internet security companies are chasing tens of billions of dollars in potential revenue. While we, the authors, are employees of Internet security companies and are happy for the opportunity to sell more products and services, we are alarmed at the kind of subversive untruths that vendor spin doctors are using to draw well-intentioned customers to their doors. Constructive criticism is sometimes necessarily harsh, and some might find the following just that, harsh. But we think it's important that organizations take a buyers beware approach to securing their business.

IBM Bringing Security Intelligence to the Cloud
05/15/2015

IBM announced it is bringing its cyber-threat analytics technology to the cloud.

Big Blue is moving its IBM QRadar security intelligence technology to the cloud to help enterprises quickly prioritize threats. The new services are available to customers through a cloud-based software-as-a-service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.

Homeland Security Official Rejects Accusations Over Visa Handling
05/14/2015

The Department of Homeland Security’s number-two official on Thursday rejected accusations he improperly interfered with a visa program for foreigners who invest in the U.S.

The department’s inspector general in March issued a report saying Deputy Secretary Alejandro Mayorkas created the appearance of favoritism in his prior job as director of U.S. Citizenship and Immigration Services.

Security Cooperation
05/13/2015

The United States pursues security cooperation in 148 countries around the world to develop partner nations capabilities, build relationships and interoperability and secure peacetime and contingency access to critical air, land and sea nodes to protect U.S. national-security interests. Security cooperation can take the form of delivering training and equipment, conducting joint exercises and exchanges and advising ministries of defense. In terms of scale, it can range from building a military from scratch to providing niche capabilities to advising partners engaged in a war fight.

Iran Says it Will Protect Yemeni Security Interests
05/12/2015

Irans deputy foreign minister said Tehran will not let regional powers jeopardise its security interests in Yemen, Tasnim news agency reported, in the strongest acknowledgement yet of Iranian involvement in the Arabian peninsula.

Iran has denied accusations from Western and Arab states that it is arming Shiite Houthi rebels in Yemen. But it has regularly condemned a Saudi-led air campaign against the insurgents.

Survey Confirms Your Digital Security Bad Habits
05/11/2015

The encryption aficionados at WinMagic dubbed 2014 The Year of the Breach due to case after case of compromised consumer data. With 2015 poised to be potentially just as risky, for the second year in a row the company has conducted a survey to find out how consumers are staying secure in this climate. WinMagic, along with the survey gurus at Nielsen, released the results at this year's RSA Conference. Unfortunately, it looks like we still have some bad habits to shake.

What We Put at Risk
WinMagics survey asked four questions to determine how people handle their privacy. Two of these questions deal with the specific information we put at risk and the devices this information goes through. When asked "Which of the following types of personal information, if any, would be at risk if your personal laptop/desktop computer or mobile device were stolen/lost? here's what computer and mobile device owners had to say.

complete article

Customers Are Not Happy With Their Data Security. Execs Are the Only Ones Surprised.
05/08/2015

A new study from consulting firm Deloitte illustrates in a few stark stats just how varied the views are.

The survey polled 2,001 American consumers and 70 consumer product executives, and the consumers were generally less positive or enthusiastic than the executives about corporate security/privacy efforts. For example, 47 percent of execs thought that customers felt it was worth it to share their personal information with companies in exchange for perks like coupons and customized promotions. But 75 percent of consumers disagreed. For product reviews, 47 percent of executives thought consumers found sharing their data worthwhile. Only 18 percent of consumers agreed.

Security Experts Hack Teleoperated Surgical Robot
05/06/2015

A crucial bottleneck that prevents life-saving surgery being performed in many parts of the world is the lack of trained surgeons. One way to get around this is to make better use of the ones that are available.

Sending them over great distances to perform operations is clearly inefficient because of the time that has to be spent travelling. So an increasingly important alternative is the possibility of telesurgery with an expert in one place controlling a robot in another that physically performs the necessary cutting and dicing. Indeed, the sale of medical robots is increasing at a rate of 20 percent per year.

But while the advantages are clear, the disadvantages have been less well explored. Telesurgery relies on cutting edge technologies in fields as diverse as computing, robotics, communications, ergonomics, and so on. And anybody familiar with these areas will tell you that they are far from failsafe.

Commandments For The Speed Of Security
05/05/2015

PF Changs. Domino’s. eBay. Home Depot. Nieman Marcus. Sony. That is not just a list of wildly successful companies, it’s also a list of hacked companies; companies whose security was profoundly, publicly compromised. And it’s just a very small sample of a much larger set.

The problem is not just that our industrys approach to security is compromised but a fear that this seemingly exponential increase in security threats could lead to even worse security, especially when married to an equally urgent emphasis on speed and usability.

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home
05/04/2015

High profile, embarrassing data hacks like the Sony email breach and the Target  credit card scandal receive the bulk of the media attention, but there's a bigger threat to Internet security that is much closer to home.

The 2015 Data Breach Investigation Report conducted by Verizon shows that the biggest threat to your private information may actually be you. Yikes.

Phishing campaigns -- which send malicious emails disguised as legitimate correspondence -- have become not only more prevalent but also more effective in tricking Internet users to open them. In past years, the DBIR reported that the overall effectiveness of phishing campaigns was between 10%-20%.

Internet of Things Security
05/01/2015

To get an idea of where potential security problems can arise, lets consider the topography of a network of things. It is a collection of objects equipped with sensors which generate data and transmit it over a communications network to each other and to servers which control the sensors and collect data from them.

A classic example is a smart metering system, which involves a network of electricity meters that measure consumer electricity usage and send the data back to an electricity companys servers. The servers may also send data, such as tariff changes or firmware updates, back to the meters.



Current Blog

2015 Security Blog Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.