Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Cyber Security Challenge Finalists
09/14/2013

The UKs first civilian cyber security training camps have ended with the announcement of eight new finalists for this years Cyber Security Challenge UK.

Held across England and Scotland, the camps provided talented amateurs the opportunity to learn about cyber defence from seasoned professionals and develop their skills for a career in the industry.

The events culminated in a camp-versus-camp online game of attack and defence through the SANS Netwars platform, used to train cyber security professionals in government departments and major corporations around the world.

After four days of competitions, talks and assessments, the finalists were announced as Adam Tonks, Robert Laverick, Matt Watkins, Stephen Martin, Darren Brooke, Brendan Saunders, Adele Rattenbury and Andrew Gill.

The Cyber Security Challenge UK began in 2010 as three competitions run by a small group of supporters from industry, government and academia to address the growing skills gap in the UK cyber security profession.

Android Security
09/13/2013

Smartphones are a treasure trove of personal information and it does not take much for people who would mean you harm to get at all that sensitive data. While putting a PIN lock on your phone helps deter physical threats, you still have to keep an eye out for sneaky apps that want your private info. Lookout Security and Antivirus is a security app that helps defend your phone against all kinds of evildoers, but you will have to pay if you want comprehensive protection.

Always Remember
09/11/2013


NEVER FORGET 9-11

Security Auditors Part of the Problem
09/12/2013

Security auditors do not distinguish between the controls at a well-run on-premises data center and the security at, say, an Amazon Web Services or Rackspace data center, even though that difference is usually massive. In the most extreme cases, we are talking a keypad lock and someone casually perusing logs versus military-grade perimeters, data integrity monitoring, maybe even guys with M16s.

Cool Seizure Detection and Notification TED Talk
09/04/2013

Talk about personal security checkout this innovative #TED talk that is for an Innovative Seizure Detection and Notification Device

Physical Security Market Growing
09/10/2013

The study reports that the global Physical Security Market is expected to grow from $55.59 billion in 2013 to $85.51 billion in 2018, at a CAGR of 9.0% from 2013 to 2018.
In the Physical Security Market, a wide range of products and services, such as video surveillance, access control, biometrics, remote management, technical support, security consulting, are included. Biometrics holds a major share in the products range. It is expected that access control market will continue to grow at a higher pace.

100 Uses of RSS Feeds
09/09/2013

Many equate RSS with blogs and little else. However, we have found that RSS is multi-faceted and has a scope far beyond blogs. Take a look at these 100 ways that RSS is being used in real world situations:

100 Uses for RSS Feeds

Security Risks
09/07/2013

Hackers can gain access to smartphones through low-security applications like social media and personal e-mail. Once a hacker attacks, he or she can breach the company network through linked applications, such as a company e-mail account. A skilled hacker can then access, extract, or even erase the company's sensitive data.

Many industries, including accounting, are still evolving from paper-based work to paperless, and many businesses are still solving the challenges that result from this transition.

Does Facebook Make You Sad?
09/06/2013

A new University of Michigan study shows that using Facebook makes us both sadder moment to moment and less satisfied over time. It was our most popular post of the week, and in response, you shared some really thoughtful comments about what social comparison does to our psyches.

Encryption Decrypted
09/05/2013

At the heart of the impending cryptopalypse are the Diffie-Hellman and Rivest-Shamir-Adleman RSA shared encryption algorithms, which were independently developed, respectively, at Stanford and the Massachusetts Institute of Technology in the mid-1970s.

Both algorithms are on the verge of being cracked — proven to be vulnerable to attack — by academic mathematicians.

There is a small but real chance that both RSA and Diffie-Hellman will soon become unusable, said the Black Hat presenters, Thomas Ptacek of Chicago-based Matasano Security, Tom Ritter and Javed Samuels of iSec Partners in New York, and Alex Stamos of Artemis Internet, a security firm in San Francisco.

Syrian Refugees Seek Safety in Iraq
09/04/2013

In recent weeks, thousands of Syrian refugees have bee pouring into Iraqi-Kurdistan. The Arbat Syrian Refugee Camp is one of many in northern Iraq. It is on the furthest outskirts of Sulaymaniah, and holds at least 100 Syrian-Kurdish families. Some in the camp fled not only because of the fighting, but because they are seeking better economic conditions as well, as many come from the lower classes in Syria.

Many worked as laborers in Syria and are now unable to support their families. The prospect for getting a job in the region does not appear likely any time soon -- Sulaymaniah is less than 20 kilometers away, and they are still living in deplorable conditions after more than six months.

Security at School
09/03/2013

Students returning to school this fall are being greeted not only by their teachers and principal. At a growing number of schools they are also meeting the armed school resource officer who will be stationed permanently on campus.

Local officials in many areas have decided to place security officers at schools this year, after a gunman last year killed 20 children and six adults at Sandy Hook Elementary in Newtown, Conn. In a few cases, they are also allowing teachers to carry concealed weapons themselves.

The National Conference of State Legislatures says lawmakers in every state introduced school safety legislation this year and in at least 20 states the proposals became law.

Security Views Differ
09/02/2013

A much higher percentage of executive-level employees believe their organizations are following security procedures through the life cycle of application development than do the engineers who are closest to executing the security processes, according to a survey of 642 IT professionals in both executive and engineering positions, which was conducted by the Ponemon Institute and Security Innovation.
Another troubling conclusion of the report was that most organizations are only taking minimal steps to address application security throughout their development process. For example, most organizations do not have a defined software development process in place and most organizations are not testing for application security.

In addition, the survey indicated executives are far more likely to agree that their organizations measure developers for compliance with secure architecture standards while only 23 percent of technicians and staff believe such measures are taken. Three-quarters of executives believe security standards are in place as opposed to just 23 percent of technicians who strongly agree or agree their organizations have defined secure architecture standards.

Security Impact on Technology
09/01/2013

How is this for an alternate reality? Imagine if the U.S. government had created institutional barriers that hindered the development of the American tech sector in the 1980s and '90s. No Microsoft or Apple, no Google nor Facebook. What would the world look like today?

The short answer is simple: The stunted growth of Silicon Valley would have allowed tech companies in other countries to fill the void, to meet the needs of the world that were being fueled by vast technological change.

Fortunately, that hypothetical scenario did not happen, but according to Daniel Castro, senior analyst with the Information Technology and Innovation Foundation, a modern-day version of it is taking place as we speak.

10 Security Tips for Customer Support
08/31/2013

What every company hopes dearly to avoid is the customer facing security incidents especially those involving compromise of customer information. While the issues related to retail customer information usually get primetime coverage, there is also the significant issue of B2B interactions with our corporate customers and partners.

Companies involved with software and system delivery projects often require customer service, sales and support staff to be deeply engaged with the customers. Often a single employee maybe dealing with multiple customers.

Homeland Security Employee Spews Hate
08/30/2013

A Department of Homeland Security employee who works on, among other things, the procurement of guns and ammunition for U.S. Immigration and Customs Enforcement, spends his nights and weekends preparing for a coming race war and advocating for anti-gay causes, according to a new report from the Southern Poverty Law Center. Meet Ayo Kimathi, a.k.a. the Irritated Genie, who told his bosses at the DHS that his anti-white, anti-gay site, War is on the Horizon, was just an entertainment site that sells concert and lecture videos.

You see, DHS employees, even those with office jobs like Kimathis, have to get outside activities approved by their supervisors, according to the SPLC. Kimathis former supervisor told the watchdog group, which tracks hate speech and groups in the U.S., that despite her former employees banal description of his extracurricular activities, the actual content of the site left her stunned.

The content of Kimathis advocacy demands some clarification. In some circles, the term black supremacist  is applied with a very wide brush.




Current Blog

2013 Security Blog Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.