This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Space Weather Outlook May 31, 2015 at 09:55PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-22 2015 May 31 at 7:44 p.m. MDT (2015 June 1 0144 UTC) **** SPACE WEATHER OUTLOOK **** Summary For May 25-31 No space weather storms were observed this period. Outlook For June 1-7 No space weather storms are expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Symantec Internet Security Threat Report Webcast

The following is external content provided as a free resource for blog readers.
Every year, organizations worldwide receive valuable insights into trends from the past 12 months, along with steps to take to stay secure in this evolving landscape.

Request Free!

Strong Cyber Protection: Keeping Bad Stuff Out and Good Stuff In

The following is external content provided as a free resource for blog readers.
It's not enough to just keep the bad stuff out (threat protection) or just keep the good stuff in (information protection). Organizations need to do both. Known analyst ESG discusses how organizations can effectively employ both to build a strong threat protection.

Request Free!

Internet Security Threat Report - Cybercrime: New Tricks of the Trade

The following is external content provided as a free resource for blog readers.
From social media vulnerabilities to digital extortion, the 2015 Symantec™ Internet Security Threat Report leverages an unparalleled amount of data and is the resource you need to quickly uncover digital threats.

Request Free!

Android Application Security Essentials: Chapter 5 - Respect Your Users

The following is external content provided as a free resource for blog readers.

"Android Application Security Essentials" will show you how to secure your Android applications and data. It will equip you with tricks and tips that will come in handy as you develop your applications.
We will start by learning the overall security architecture of the Android stack. Securing components with permissions, defining security in a manifest file, cryptographic algorithms and protocols on the Android stack, secure storage, security focused testing, and protecting enterprise data on your device is then also discussed in detail. You will also learn how to be security-aware when integrating newer technologies like NFC and mobile payments into your Android applications.

At the end of this book, you will understand Android security at the system level all the way to the nitty-gritty details of application security for securing your Android applications.

This book will help you:

  • Understand Android security from kernel to the application layer
  • Protect components using permissions
  • Safeguard user and corporate data from prying eyes
  • Understand the security implications of mobile payments, NFC, and more


Request Free!

Mobile Security: How to Secure, Privatize, and Recover Your Devices: Chapter 3 - Privacy - Small Word, Big Consequences

The following is external content provided as a free resource for blog readers.

In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.

What you will learn from this book:

  • Learn how mobile devices are monitored and the impact of cloud computing
  • Understand the attacks hackers use and how to prevent them
  • Keep yourself and your loved ones safe online


Request Free!

Building Virtual Pentesting Labs for Advanced Penetration Testing: Chapter 1 - Introducing Penetration Testing

The following is external content provided as a free resource for blog readers.

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity.

Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills.

This book includes:

  • Build and enhance your existing pentesting methods and skills
  • Get a solid methodology and approach to testing
  • Step-by-step tutorial helping you build complex virtual architecture


Request Free!

Security Solution Helps Day Care Chain Enhance Safety at 15 Locations

The following is external content provided as a free resource for blog readers.

The primary objective for a video surveillance solution was to provide the administration and security teams with a means to monitor and record all day care events, for security, risk mitigation, and to use as a tool to help manage and train the teachers at each facility. Additionally, the franchise wanted to offer its parents a greater peace of mind, and differentiate itself from facilities that did not provide such security coverage. This solution required installation of a security system at each day care site – with the ability to monitor and manage all systems remotely from a centralized location.



Request Free!

Lincoln Tech Bridges Gap from Analog to IP with Hybrid Solution

The following is external content provided as a free resource for blog readers.

Lincoln Tech needed to expand its student training program and simulation capabilities with a hybrid solution that supported both analog and IP technologies.

 

In order to make its first venture into the world of IP-based electronic systems, Lincoln Tech needed components that would

be easy for its trainers to master quickly so that they would be able to effectively incorporate the new equipment into EST courses. To achieve those objectives, Education Supervisor Barry Wexler turned to Supercircuits for help.



Request Free!

How Selecting a Real-Time Video Surveillance System for Schools Introduced a New Player to the Game

The following is external content provided as a free resource for blog readers.

Alvin lSD conducted an in-depth process to identify the ideal IP security solution that
would allow all schools to be managed from a central location.

Originally, cameras considered for the project were limited to Axis, Panasonic, Samsung,
and Bosch. However, Charles Colwell, project manager, had worked with Supercircuits
previously, and invited the company to participate in the evaluation process. After
extensive testing, SC IP and Megapixel cameras were found to offer equal or better
performance at extremely competitive prices, and Supercircuits was rewarded the
business.



Request Free!

How to dramatically decrease merchandise shrinkage

The following is external content provided as a free resource for blog readers.

Most retailers want to keep their security systems up to date without having to replace the existing hardware installed in their locations. A hybrid system that supports analog cameras but also newer digital IP cameras provides a solution to have state-of-the-art security monitoring capabilities for a reasonable budget. Especially for retailers that want to connect their Point-Of-Sale systems to security systems, this approach to upgrading their security system has shown many benefit: monitoring stores, addressing loss prevention, monitoring employees, better footage archiving, and much more.



Request Free!

Space Weather Outlook May 25, 2015 at 04:29AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-21 2015 May 25 at 2:18 a.m. MDT (2015 May 25 0818 UTC) **** SPACE WEATHER OUTLOOK **** Summary For May 18-24 Category G1 (Minor) geomagnetic storming occurred on 18 May while category G2 (Moderate) geomagnetic storming occurred on 19 May due to coronal hole high speed stream effects. Outlook For May 25-31 A chance for R1-R2 (Minor-Moderate) radio blackouts exists from 30-31 May due to the return of old Region 2339. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

2015 Mobile Threat Report

The following is external content provided as a free resource for blog readers.
The research illustrates that in 2014, nearly one million (931,620) unique malicious applications were produced, or rather a 391 percent increase from 2013 alone. Android devices continue to be the main target of malware and was 97 percent of all mobile malware developed.

Additional key findings from the report include:
  • The ability to take profit from an end user with SMS premium services or ad networks is a capability of each of the top 10 malware threats identified in 2014.
  • The overwhelming majority of Android malware is being developed and distributed in unregulated third party app stores in the Middle East and Asia.
  • There were four iOS targeted attacks in 2014 and most targeted jailbroken devices. However, WireLurker is the first example of a non-jailbroken iOS device being infected by tethering to an infected Mac device.
The Pulse Secure Mobile Threat Center conducts around-the-clock security, vulnerability and malware research on mobile device platforms. The Mobile Threat Report analyzes attacks, threat vectors and the common misuses of mobile devices that have led to a significant risk spike in mobile devices.

Request Free!

Government Web Security and the OWASP Top 10: The Big Picture

The following is external content provided as a free resource for blog readers.
Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritisation of risks and most importantly, how government organisations building software for the web can protect against them.

Request Free!

How To Replace FTP and Increase File Transfer Efficiency by 98% With Biscom Secure File Transfer -- A Customer Success Story

The following is external content provided as a free resource for blog readers.

The increase in people sharing data and files, combined with size and security limitations of email and FTP, has forced organizations to seek solutions for sending large and confidential files while complying with a multitude of compliance and regulatory requirements. Biscom Secure File Transfer (SFT), a secure and managed file-transfer solution, handles file transfers easily and tracks all transactions. With its simple user interface, extensive reporting and auditing capabilities, and robust encryption and security technologies, SFT helps organizations meet their most challenging file delivery and collaboration needs.



Request Free!

Gain Situational Awareness Needed To Mitigate Cyberthreats

The following is external content provided as a free resource for blog readers.
Despite world-class technology, cyber attacks and breaches on government networks are inevitable. To become more resilient against cyberthreats, agencies must improve visibility and understand events happening on their networks.

The report introduces you to a platform approach to connecting disparate data to gain the desired network visibility. By understanding all your data, you gain a complete operational view of organizational data, to improve your organization's security posture. Specifically the report provides insights to:
  • Help organizations find value from their data to reduce the impact of cyber incidents
  • Outline challenges cybersecurity professionals in government face with solutions that optimize use of their data to address these challenges
  • Introduce a holistic and data-analysis-based approach to improving cyber security
  • Share real examples including insights from the Nevada Department of Transportation
Cybersecurity remains one of the nations biggest challenges but with increased situational awareness derived from insights and knowledge from data, organizations are empowered to move from a reactive to proactive approach.

Request Free!

Big Data for Government Drives Improvements in Cybersecurity and Service Delivery

The following is external content provided as a free resource for blog readers.
The data generated by all of a government organization's applications, servers and network devices is an insurmountable amount of information. The output of these systems resides in a wide variety of disconnected silos and frequently discarded. The correlation of these massive silos of data is likely not possible or technically feasible. This is the big data dilemma.

Unlocking the value an organization's data represents a big opportunity for government. Learn about four capabilities that a big data strategy must incorporate to drive improvements in cybersecurity and service delivery:
  1. Data ingestion from disparate sources and datastores, including Hadoop and relational databases
  2. Support for a wide variety of big data-influenced use cases: security, compliance, IT operations, application management, real-time analytics
  3. Analysis and visualization that leverages real-time data correlation
  4. Scalability to collect tens of terabytes of data per day and analyze petabytes of data at rest
A forward-thinking big data strategy can help government agencies use massive amounts of data to support new services, create efficiencies and better understand citizen needs.

Request Free!

Data Center in the Crosshairs: Today's Most Dangerous Security Threats

The following is external content provided as a free resource for blog readers.
Comprising the most valuable assets in your organization – your web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers. This paper analyzes the top five most dangerous threats to your data center. It also describes the impact of these threats and it reveals the latest methods, tools and techniques used by attackers to exploit data center resources.

Request Free!

DDoS Report: The Escalating Threat of DDoS Attacks

The following is external content provided as a free resource for blog readers.
Virtually every commercial and governmental organization today is largely - if not entirely - reliant on its online services, and service availability is completely at risk from the rising tide of DDoS attacks. If you are concerned about the possibility of major service outages due to DDoS attacks, you should ensure that your vendor can scale to mitigate the largest multi-vector attacks at your network's edge.

Request Free!

Space Weather Outlook May 18, 2015 at 12:24AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-20 2015 May 17 at 10:12 p.m. MDT (2015 May 18 0412 UTC) **** SPACE WEATHER OUTLOOK **** Summary For May 11-17 Category G1 (Minor) and G2 (Moderate) geomagnetic storms were observed on 13 May due to effects from a negative polarity coronal hole high speed stream. Outlook For May 18-24 No space weather storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Server Security: Not What It Used to Be!

The following is external content provided as a free resource for blog readers.
Although organizations have considerable interest in endpoint and network security, the modern datacenter, which includes physical and virtual servers and can also encompass cloud environments, remains a valuable but neglected component of the infrastructure that must be protected. However, the key is that the security must also be efficient in the context in which it is deployed so as to not degrade the datacenter's overall server performance. This report defines what server security is, examines how and why the server security market is growing, and highlights the capabilities of Trend Micro in this strategically important area.

Request Free!

Defend Against Future Windows Server 2003 Vulnerabilities

The following is external content provided as a free resource for blog readers.
End of Support (EOS) for Microsoft Windows Server 2003 in July of 2015 will put millions of enterprise servers at risk. According to a recent study by leading analyst firm ESG, “More than 80% of enterprise and midmarket organizations still support Windows Server 2003”. Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits.

Request Free!

Security Expertise for Businesses Like Mine

The following is external content provided as a free resource for blog readers.
Imagine that you have safely locked up your business after everyone has gone home. Hours later, seeing opportunity, a burglar smashes through the front door, climbs inside and takes thousands of dollars' worth of property. The next day, you assess the situation, and as your employees grow uneasy, you wonder about the toll this theft is going to take financially and emotionally on you and your entire company.

Request Free!

The User Enablement Dilemma

The following is external content provided as a free resource for blog readers.
Workers in the digital age are empowered like no other generation. Yet, most IT and Security professionals are still trying to catch up with the security and compliance implications of their dynamic new relationships with employees. For today's IT professionals, people are at the heart of complexity and risk. You can see it from a high-level perspective with this informative infographic.

Request Free!

5 Truths about Securing Digital Workspaces

The following is external content provided as a free resource for blog readers.
Companies face an intensifying barrage of IT security threats. IT security challenges are compounded by multiple factors, including:
  • the use of personal devices for work activities
  • the work-from-anywhere mobility of today's workers
  • the expanding threat surface that must be defended as IT infrastructure extends to the cloud
The friction between the demand for user enablement and the need for security must be reconciled with a user-centric approach to IT security, instead of traditional device-centric approaches. Get your straightforward blueprint for keeping security in pace with a fast-evolving digital work environment. Download the white paper.

Request Free!

Security Tools and Their Unexpected Uses

The following is external content provided as a free resource for blog readers.
Video surveillance isn't new. Neither is intrusion detection or access control. Yet although they've been security staples for decades, their full abilities are surprisingly rarely exploited. But that's beginning to change.

Request Free!

The Control Is Yours: Five Reasons to Use Mobile Security Management Applications

The following is external content provided as a free resource for blog readers.
Mobility has become integral to modern business. Small-business owners appreciate the flexibility, freedom and control it gives them, especially when off site. This white paper highlights five reasons to adopt the next generation of mobile security applications, and it outlines the capabilities that enable you to maximize your time and resources.

Request Free!

The Risks of One-Size-Fits-All Security

The following is external content provided as a free resource for blog readers.
Security concerns differ from industry to industry. So why do many businesses settle for one-size-fits-all security systems? Discover the potential threats to businesses such as car dealerships, restaurants and retailers, and the ways you can better protect against them.

Request Free!

5 Reasons for Federated Single Sign-On

The following is external content provided as a free resource for blog readers.
Employees and IT teams are managing multiple passwords on multiple devices putting businesses at risk with every sign-on. Hackers are sophisticated and the traditional password system no longer works. To stay secure in today's business world, organizations must adopt an identity security solution. A good starting place is federated identity that provides secure single sign-on and multi-factor authentication giving access to only those that need it.

Request Free!

17 Questions to Ask Your IAM Provider

The following is external content provided as a free resource for blog readers.
Business demands are causing an increase in new identity security challenges – thus the number of Identity and Access Management (IAM) providers has skyrocketed. And while everyone claims to be the “best,” it's important to be able to discern truth from fluff.

Request Free!

Password Your Days are Numbered

The following is external content provided as a free resource for blog readers.
Passwords are still used to protect valuable information and failing miserably. This practice opens up massive opportunities for criminal networks and putting companies and individuals at risk. The longer you let the status quo ride, the greater your risk and the higher the price you will pay for a breach.

Request Free!

Step out of the Bull's-Eye: Protect Your Organization against Advanced Threats and Targeted Cyberattacks

The following is external content provided as a free resource for blog readers.
Cybersecurity is a major concern in both the private and public sectors. Targeted attacks aimed at commercial and government organizations are on the rise, in both frequency and severity. Computer networks and systems continue to be targets of intrusions, exploitation, and data theft by a variety of cybercriminals searching for sensitive financial information, personally identifiable information (PI) such as social security numbers, as well as geopolitical knowledge and corporate intelligence.

In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries' motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.

Request Free!

Rethinking Security: Fighting Known, Unknown, and Advanced Threats

The following is external content provided as a free resource for blog readers.
To effectively navigate the increasingly sophisticated and complex threat landscape and keep your organization out of these kinds of news stories, you need a multi-layered, comprehensive IT security approach for detection, protection, and remediation of today's cyberattacks.

Download Kaspersky Lab's latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about:
  • The evolution of cyberthreats that put your business at risk
  • How malware is often used as a door opener to launch more sophisticated, targeted attacks
  • The necessary features of a multi-layered security solution to defend your IT infrastructure today


Request Free!

Future Risks: Be Prepared

The following is external content provided as a free resource for blog readers.
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn't enough.

Kaspersky Lab recommends focusing on prevention and mitigation of advanced threats. Our Global Research and Analysis Team (GReAT) wants to help with that effort.

Download Future Risks: Be Prepared - A Special Report on Mitigation Strategies for Advanced Threats to learn:
  • How the latest advanced threats target enterprise organizations
  • Why mitigation is so important
  • Key strategies to protect your business against known, unknown and advanced threats


Request Free!

Space Weather Outlook May 11, 2015 at 02:05AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-19 2015 May 10 at 11:54 p.m. MDT (2015 May 11 0554 UTC) **** SPACE WEATHER OUTLOOK **** Summary For May 4-10 R1 (Minor) radio blackouts occurred on 05-06 May due to flare activity from active sunspot Regions 2335 and 2339. An R3 (Strong) radio blackout occurred on 05 May due to flare activity from active sunspot Region 2339. G1 (Minor) geomagnetic storming occurred on 06 May due to a coronal mass ejection that was the result of a 02 May filament eruption. Outlook For May 11-17 There is a chance for R1-R2 (Minor-Moderate) radio blackouts for the forecast period (11-17 May) due to potential significant flare activity from active sunspot Region 2339. G1 (Minor) geomagnetic storming is likely on 12-13 May due to coronal hole high speed stream activity. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Global Insights on Document Security

The following is external content provided as a free resource for blog readers.
Gain insight into:
  • The impact and risk of the BYOD movement on document security
  • Why companies focus on protecting information, not the IT stack
  • Restrictive and preventative controls on mobile devices
  • Document security technologies that are most important to the protection of information
Download this white paper to learn more.

Request Free!

Space Weather Outlook May 04, 2015 at 02:35AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-18 2015 May 4 at 12:23 a.m. MDT (2015 May 4 0623 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 27-May 3 No space weather storms were observed. Outlook For May 4-10 A chance exists for R1-R2 (Minor-Moderate) radio blackouts for the forecast period due to flare activity associated with Region 2335 and the return of old Regions 2322 and 2325. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Wanted: Guardians to Keep Sensitive Data Safe & Protected

The following is external content provided as a free resource for blog readers.
Every company holds sensitive data – social security numbers, credit card data, company financials, intellectual property and more. However, many don't have a clear view of what they are storing for sensitive data or, more concerning, knowing where it resides. Understanding where sensitive data is held, how it's protected and who can access it within or outside the organization is critical. Learn how you can see inside your dark data files, know who has accessed confidential information and protect your sensitive data from those who shouldn't have access to it.

Request Free!