Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Who Controls Security
09/25/2015

To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you are in the driver’s seat, and that you did not hand over your car keys, along with your corporate data security and privacy, to someone else.

Resettling Refugees
09/23/2015

The U.S. has resettled only about 1,500 Syrian refugees since the crisis began in 2011. Congressional opponents opposed to taking in more often cite security concerns. Republican presidential candidate Carly Fiorina said Sunday that the U.S. should be very careful about who we let enter this country from these war torn regions to ensure that terrorists are not coming here.

But as a national security expert who has spent more than 20 years working alongside government defense and security experts, I know that the majority of Syrian refugees fleeing war are not using the opportunity of refugee status to embed themselves as terrorists in the West. The majority are trying to escape barrel bombs, chemical attacks, and barbaric violence, caught between the violence of a dictatorial regime and that carried out by terrorists.

Start With Security
09/21/2015

The head of the nation's primary consumer protection agency on Wednesday paid a visit to San Francisco, where she called on technology startups to do a better job of incorporating security protections as they race to bring new applications into the market.

Federal Trade Commission Chairwoman Edith Ramirezs comments amplified the agencys Start With Security initiative, a program that aims to encourage businesses to prioritize cybersecurity as an integral part of their product development.

Even the FBI is worried about Internet of Things security
09/18/2015

Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors and analysts about looming security threats. Now you can add the FBI to that list of those cautioning enthusiasts.

The Bureau this week issued a public service announcement regarding cybercrime opportunities posed by the connecting of all sorts of data-enabled devices, from medical gear to entertainment gadgets, to the Internet.

MIT Ranks High in Bad Security at Major Universities
09/16/2015

One of the most prestigious schools in information technology also ranks first among its peers in information security in a new study—first among the worst, that is. In a recent security survey of 485 colleges and universities around the world with 1,000 or more public Internet Protocol addresses, the Massachusetts Institute of Technology ranked at the bottom, earning just above an overall failing grade. The assessment, performed by the information security assessment company SecurityScorecard, gave MIT a nearly failing grade, putting the school in the basement below New Mexico State University and Cambridge University.

Ex-Ashley Madison CTO Files Libel Lawsuit Against Security Researcher For Publishing Hacked Emails
09/15/2015

After the user data leaks that put adult-oriented site Ashley Madison in the spotlight, the company's problems are far from over. Raja Bhatia, former Ashley Madison CTO, is bringing famous security researcher, Brian Krebs, to court in a libel lawsuit. The legal action is based on a series of disputable comments Krebs made in a report. Bhatia would like to see these allegations amended but so far, Krebs is reluctant to do so.

The report quotes a series of emails between Bhatia and Noel Biderman, former CEO of Avid Life Media, parent company of Ashley Madison. In them, Bhatia reveals that he found a security breach on the site Nerve.com, one of Ashley Madisons competitors.

White House Spurns Waldorf Astoria Out of Security Concerns
09/14/2015

With Chinese spies rummaging through White House emails, President Obama has decided not to risk making their spying any easier: He will break with tradition and abandon the Waldorf Astoria, which was bought last year by Chinese investors with deep ties to Beijings ruling elite, when he attends the United Nations General Assembly next week.

Internet of Things
09/10/2015

Not long ago, Dick Bussiere visited a power station. The visit was part of his job as Tenable Network Securitys principal architect for the Asia Pacific Region. And what did he find? A machine running Windows 2000 Server connected to the network, in control of things.

That operating system is half a decade past its use-by date.

Bussiere was not surprised, however. In the world of the Internet of Things, all these things have a much longer life cycle.

Want Privacy And Security? You Must Be Joking
09/09/2015

Yesterday I gave a talk at PARC (Xerox) and one of the attendees asked me what I think about the future of privacy and security, to which I replied, you must be joking. The only way anyone can have any privacy today is you raise them from birth in the woods without being anywhere near technology of any kind.

Execs Lack Confidence in Cybersecurity Plans
09/07/2015

A  survey of 100 security executives by Raytheon Cyber Products Websense found 63% of respondents said their organization had suffered one or two breaches in the past year, while 17% said three to five and 6% said 10 or more. More alarmingly, 13% said they were unaware how may breaches may have occurred. The survey found 65% of respondents said they were somewhat confident with their organizations current security posture, with 31% feeling  very confident.

The survey found this lack of confidence may stem from the use of quantitative metrics to measure the effectiveness of their security programs.

Belgium Calls on Neighbors for Security
09/04/2015

Belgiums prime minister called on Saturday for urgent talks with France, Germany and the Netherlands to seek more security measures on cross-border trains, after a gunman was wrestled to the ground by passengers.

Two people were wounded in the struggle on Friday to subdue a suspected Islamist militant who had boarded a high-speed train from Amsterdam to Paris in Brussels in what Belgian Prime Minister Charles Michel described as a terrorist attack.

Extortionists Target Ashley Madison Users
09/02/2015

People who cheat on their partners are always open to extortion by the parties involved. But when the personal details of millions of cheaters get posted online for anyone to download — as is the case with the recent hack of infidelity hookup site AshleyMadison.com — random blackmailers are bound to pounce on the opportunity.

According to security firms and to a review of several emails shared with this author, extortionists already see easy pickings in the leaked AshleyMadison user database.

Hackers expose security flaws in cars, phones — even guns
08/31/2015

The biggest cybersecurity conferences of the year -- BlackHat and DefCon -- are taking place in Las Vegas, and researchers are showing off new ways to hack Internet-connected cars. Watch CNET Update to learn about some of the latest flaws found, including a way to hack TrackingPoints high-tech rifle.

Security is a bigger concern when more devices can connect online. But while we debate why a gun needs an app, Facebook is working to bring Internet to more countries with drones.

What Amateurs Are Learning About Security
08/27/2015

With the non-stop stream of zero-day exploits, website breaches, and criminal hacking enterprises, it is not always easy to know how best to stay safe online. New research from Google highlights three of the most overlooked security practices among security amateurs—installing security updates promptly, using a password manager, and employing two-factor authentication.

The practices are distilled from a comparison of security practices followed by expert and non-expert computer users. A survey found stark discrepancies in the ways the two groups reported keeping themselves secure. Non security experts listed the top security practice as using antivirus software, followed by using strong passwords, changing passwords frequently, visiting only known websites, and not sharing personal information. Security experts, by contrast, listed the top practice as installing software updates, followed by using unique passwords, using two-factor authentication, choosing strong passwords, and using a password manager.



Current Blog

2015 Security Blog Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.