Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
4 Vital Cyber Security Measures Every Safety-Conscious Entrepreneur Needs to Take
11/01/2017

The transition to increased connectivity and quick, seamless, one-click solutions has also given rise to security issues when it comes to the private information held by the institutions leveraging those innovative solutions that optimize business operations.

In their bid to be more connected, businesses have increased the touch points of their organizations across networks, increasing the opportunities cyber criminals have to penetrate: Every time any of us visit Angies List, BestAdvisor (U.K.), Yelp or any other review site to decide on what to purchase, then proceed to Amazon, Walmart or other ecommerce store, whipping out our credit cards and making a purchase, we are releasing vital pieces of personal information.

Things only get worse when we fill out a  detailed form online. This is fodder for the plethora of hackers seeking ways to penetrate personal and corporate firewalls ,to get to the private information they protect. No wonder so many organizations spend so much on security. No wonder we can't ignore the vital role cyber security plays for businesses and individuals.

Five Tips To Improve Your Corporate Security Program
10/30/2017

With the continued proliferation of data breaches and other network security threats, cybersecurity spending is projected to climb to US$90 billion worldwide this year. As such, more companies are looking to build robust IT organizations with enhanced capabilities to combat the ever-evolving cyber threats. Companies are busy upgrading their systems, hiring employees and partnering with third parties to keep up with the pace of change. So, what do IT leaders need to prioritize to be sure their efforts have both an immediate and long-term impact on the integrity of their networks and systems?

The first step is to develop a strategy that brings an organization together to understand WHY cybersecurity is the responsibility of all employees.

Googles Android Oreo
10/27/2017

In addition to the many tweaks and new features in Google’s Android 8.0 Oreo operating system introduced last month, the biggest changes are its security enhancements.

Oreo security additions are meaningful and go far beyond what recent OS updates have brought to the table.

U.S. Homeland Security found SEC had critical cyber weaknesses in January
10/25/2017

It was not clear if the vulnerabilities detected by DHS are directly related to the cyber breach disclosed by the SEC. But it shows that even after the SEC says it patched promptly the software vulnerability after the 2016 hack, critical vulnerabilities still plagued the regulators systems.

Cyber Security News Roundup: Hackers! Hackers Everywhere!
10/23/2017

The trouble with cyber security is that there is virtually no good press. You don’t make it in the news for fighting off an attempted DDoS attack or for successfully updating and patching your systems. Nobody cares about that stuff. We, as a society, are more interested in the disasters. They may not admit it, but the majority of the people in the stands at a NASCAR race aren’t there to admire the mechanical ingenuity on display, nor are they particularly interested in the beauty of a perfect racing line. They want to see cars go fast and they’ll happily take a crash or two along the way.

Should Apple iPhone X Trust Facial Recognition for Security?
10/20/2017

Your face is the future of smartphone security. Apple made that clear last week when it unveiled the pricey iPhone X, which trades in the familiar home button and TouchID fingerprint scanner for a new camera system that unlocks the device using facial recognition.

The company has repeatedly proved its ability to push emerging technology into the mainstream—but with FaceID, Apple claims to have conquered many of the challenges that have prevented the widespread use of facial biometrics.

In spectacular fail, Adobe security team posts private PGP key on blog
10/18/2017

Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRTs e-mail account—both the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.

Security barriers put to the test as vehicles become weapons
10/16/2017

Bollards—those usually waist-high pillars that are often made out of a combination of carbon, steel or cement—are being seen just about everywhere these days, from sports arenas to the parking lots of convenience stores.

Calpipe put these types of bollards to the test at Texas A&M’s Transportation Institute. The Now was on the hot concrete of this former Air Force based-turned laboratory in Bryan, Texas, as researchers measured how well the bollards held up with a dummy vehicle going at speeds of 10, 20, and 30 miles per hour.

Homeland Security says election hackers targeted state
10/13/2017

The federal government on Friday told election officials in 21 states — including Connecticut — that hackers targeted their systems last year, although in most cases the systems were not breached.

Cyber Security Regulations
10/11/2017

We claim we are in a new era of cybersecurity threats and that ransomware is the threat du jour, given how WannaCry and Petya continue to make waves. But we are also in an era of a new wave of cybersecurity regulations. When looking at the latest attacks, some would argue that the same old vulnerabilities are to blame, and that is because organizations are dragging their feet in implementing the critical security measures to protect themselves.

High-profile breaches like those that impacted HBO, Target and Home Depot are just three examples -- but there are many others (too many to list for 2017 alone, and we still have roughly four-and-a-half months to go). As a result, we’re now seeing new regulations emerge that are forcing organizations to get their proverbial houses in order.

The Haves And Have-Nots In Cybersecurity: How Your Company Can Level The Playing Field
10/09/2017

Simply put, the nations most-skilled cybersecurity experts want to work on big, interesting problems. Maintaining the firewall for a regional bank in Cleveland, say, or protecting a mid-size law firm does not qualify as interesting. Interesting is protecting trillions of dollars at Goldman Sachs—or going toe-to-toe with Russian, Chinese or North Korean hackers at the CIA or NSA.

Interesting also means getting paid a lot. And most companies have a hard time affording the salaries many top cybersecurity pros demand. According to a recent report from DICE, an IT-focused jobs website, the average Director of Security makes more than $178,000 a year. It is not surprising, given the demand. A report by research firm Frost & Sullivan forecasts that by 2020, 1.5 million cybersecurity jobs will go unfilled.

Cyber Security Help Wanted
10/06/2017

People with Asperger Syndrome have distinct advantages when it comes to combating cyber crime.

Most hackers are atypical. A research document from Scotland Yard last year indicates the majority of hackers in England are Aspergers. Some of them are identified; others do not disclose it.
Aspergers are extremely detailed oriented, which leads to a no stone unturned approach to cybersecurity.
Aspergers are cognitively different, so they are naturally out of the box and find innovative solutions to problems without the usual cognitive Blind spot of non-autistic people.
Aspergers are extremely focused and can have a high level of concentration. They are capable of hyperfocusing and never let go when they are looking for something.
They have a high capacity for analysis. You can find brilliant Asperger people working as Security Operations Center (SOC) analysts, for example.
They have a demonstrated superior capacity to identify patterns. The Israeli army has created an elite squad unit 9900 composed solely of Autistics to deduct with pattern recognition troop movements on satellite images.
It is been scientifically proven that Aspergers are methodological and make more rational decisions (less cognitive biases).
Many Aspergers are optimal problem solvers — they focus on finding the best solutions, not one of the best.
Autistics have what is called Specific Interests: They will read and memorize huge amounts of information in an obsessive way and, therefore, excel in their field of expertise.
People on the spectrum search for intellectual stimulation, complex challenges, and many have the investigator profile, which is highly valuable for forensics and pen testing.

Companies should treat cybersecurity as a matter of ethics
10/04/2017

Cybersecurity should not just be a matter of technology but also one of morality. Is it ethical to market and sell technology that leaves consumers and their homes vulnerable to hackers?

Malcolm Harkins thinks these are worthy questions. Harkins spent 24 years at Intel Corp., rising to the position of chief security and privacy officer. Given the increasing number and audacity of hacks, he thinks we have reached a tipping point of sorts where corporations need a fundamental rethink of cybersecurity.

And Harkins really does mean fundamental. He argues that companies should formally classify protecting consumer data and privacy as a social responsibility, akin to combatting climate change, fighting poverty, or promoting diversity. Codifying cybersecurity into a companys ethical DNA is the only way, he argues, to force businesses to weigh consumer safety and privacy risks before creating new products and services.

Windows 10 and Security
10/02/2017

Windows 10 has been out for over two years now, but those who have yet to upgrade have been urged to do so or risk facing a huge security crisis.

Latest Netmarketshare figures have Microsofts Windows as the leading desktop browser, with a staggering 90.70 per cent share.

However, the version of Windows that is most popular is not Microsofts latest OS Windows 10 - but Windows 7, released back in 2009.

While Windows 7s market share is down from 60.75 in August 2015 to 48.43 per cent in August 2017, it is in fact UP on this time last year.

Then, Windows 7 had a 47.25 per cent market share.

Microsoft have already penciled in the end of support for Windows 7, and it is not far away.

January 14 2020 will mark the end of life for Windows 7, which is currently the most popular OS on the planet according to Netmarketshare figures.

And these users will need to update to a more recent versions of Windows, or risk exposing themselves to potential cyber attacks.



Current Blog
2017
October Archive

September Archive
August Archive
April Archive
March Archive

February Archive
January Archive

2016 Security Blog Archive
November /December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.