足球竞猜app软件网络世界 //m.banksfrench.com en - us 2020年4月17日星期五02:20:30 -0700 2020年4月17日星期五02:20:30 -0700 https://idge.staticworld.net/nww/networkworld510x510.png 足球竞猜app软件 m.banksfrench.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 足球竞猜app软件 m.banksfrench.com 796 288 物联网的网络和设备安全的五大误解 周五,2017年九时48分○○秒-0700 5月26日 瑞安弗朗西斯 瑞安弗朗西斯 <文章类=“幻灯片”> <图类=“幻灯片”> < figcaption > < / figcaption > < img data-imageid倍数的安全=“100587331”src = " http://images.techhive.com/images/article/2015/05/home -安全- 100587331 - gallery.idge.jpg”data-thumb-src = " http://images.techhive.com/images/article/2015/05/home -安全- 100587331 - small.idge.jpg“alt =“家庭安全”data-license =“伤风公司。”/ > < p class = " slideCredit " >图像有把握力<跨类= " slideCreditText " > < / span > < / p > < div class = " slideBody " > < p >物联网(物联网)描述了一个独立设备的互联系统,通信和传输数据在现有互联网基础设施,提供更大的洞察力和控制元素在我们的生活日益相关。到2020年,全球预计将部署300亿台联网设备,全球物联网的前景正在迅速接近,对联网组织构成了全新的威胁。对于潜在的攻击者来说,设备呈现出一个有趣的目标有几个原因。首先,许多设备由于其功能的简单性而具有内在的价值。例如,一个连接的安全摄像头可以提供有关特定位置的安全状态的有价值的信息。黑客已经在利用物联网设备对网络和服务器进行多种类型的恶意攻击。2016年的DSL、DDoS和bot攻击已经证明,黑客愿意利用的机会并不缺乏。Portnox解释了这些常见的误解。< / p > < p class = " jumpTag " > < a href = " /文章/ 3198629 / top-5-misconceptions-of-iot-network-and-device-security。要完整阅读这篇文章,请点击这里

//m.banksfrench.com/article/3198629/top-5-misconceptions-of-iot-network-and-device-security.html
如何进行物联网笔测试 星期四,2017年15:12:00 -0700 5月25日 瑞安弗朗西斯 瑞安弗朗西斯 <文章> <节类=“网页”>

渗透测试很像服用槌要塞的门。保持冲击远,也许找到一个秘密的后门进入通过。但是,如果网络作品是外面的堡垒,会发生什么?随着物联网设备互联网的乱舞,是更难与许多设备和结束点进行笔测试

克劳德萧,主安全研究员,单元42在帕洛阿尔托网络,所述用于只是测试在一个黑盒子的方式物联网设备的某些网络服务,难易程度和步骤与普通笔测试类似。But if you're discovering vulnerabilities via analyzing firmware or via analyzing wireless communications (e.g., Bluetooth or ZigBee), that's much harder.

To read this article in full, please click here

//m.banksfrench.com/article/3198495/how-to-conduct-an-iot-pen-test.html
本周新产品5.22.17 2017年5月22日星期一03:30:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章类= “幻灯片”> <人物类= “滑动”>
运行其过程 图像通过<跨度类=” slideCreditText “>解开

网络世界的长期运行的产物足球竞猜app软件本周幻灯片已经到了在此版本中结束。供应商仍然欢迎洽谈与记者他们的产品。Thank you to all who have submitted products.

 

Cyphon
052217 dunbar

Image by dunbar

To read this article in full, please click here

//m.banksfrench.com/article/3197667/new-products-of-the-week-5-22-17.html 如何维护数据监督以避免“影子数据” 2017年5月18日星期四09:25:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章类=“幻灯片”> <图类=“幻灯片”> < figcaption >数据风险< / figcaption > < img data-imageid = " 100699730 " src = " http://images.techhive.com/images/article/2016/12/shadowy -攻击-冠- 100699730 - large.jpg”data-thumb-src = " http://images.techhive.com/images/article/2016/12/shadowy -攻击-冠- 100699730 - small.jpg“alt = "影子IT " / > < p class = " slideCredit " > < a href = " http://www.publicdomainpictures.net/view-image.php?形象形象= 44608”rel = " nofollow”目标= "平等slideCreditLink“类= > <跨类= " slideCreditText " >乔治Hodan < / span > < / > < / p > < div class = " slideBody " > < p >在他退休之前,员工办公室的美国货币监理署(OCC) < a href = " https://www2.occ.gov/news - issuances/news releases/2016/nr OCC - 2016 - 138. - html”目标= "平等" >上传超过10000 OCC记录< / >在两个可移动拇指驱动器。2015年11月退休;该机构直到次年9月才发现这个漏洞。从被入侵到被发现,差不多有一年的时间。OCC无法恢复u盘。< / p > < p class = " jumpTag " > < a href = " /文章/ 3197415 / how-to-maintain-data-oversight-to-avoid-shadow-data。要完整阅读这篇文章,请点击这里

//m.banksfrench.com/article/3197415/how-to-maintain-data-oversight-to-avoid-shadow-data.html
外包安全:你的钥匙交给第三方? 2017年5月17日星期三07:24:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <本文> <节课=“页面”>

年前,想都不敢想放弃控制权,以保护您最宝贵的资产。但对于一些企业移交的风险的安全密钥给第三方小于面临攻击的每日接二连三的想法。

当问其原因,公司将放弃控制,许多厂商表示这取决于人手那家公司的水平了。如果专业知识缺乏,所以抓住这个机会。或者,如果它是一个中小型企业,也许是不创造一个安全的工作人员达到所需水平的预算。因此,与托管安全服务提供商合作(MSSP)已经面对过的数据盗窃和初入职场的移动设备数量的担忧几乎成为一绝。 

To read this article in full, please click here

//m.banksfrench.com/article/3197156/outsourcing-security-would-you-turn-over-the-keys-to-a-third-party.html
事件响应就像追踪罪犯一样 周一,2017年五点06分00秒-0700 5月15日 瑞安弗朗西斯 瑞安弗朗西斯 <文章类= “幻灯片”> <人物类= “滑动”>
什么是事件响应 图像通过<跨度类= “slideCreditText”>肖像历史

事件响应是像调查真正的盗窃。你看在犯罪现场的入侵者的证据,找到他的目标,他的私家车,并修复任何漏洞。发现您勾花网的任何削减。就拿更多的角度后退了几步。发现入侵者的目标。附近的围墙受损的资产是什么?调查在两个方向上找到了入侵者的目标和私家车。修复围栏。解决任何问题和修补漏洞。 阅读这篇文章完全,请点击这里 //m.banksfrench.com/article/3196806/incident-response-is-like-tracking-down-a-perpetrator.html CISOs如何回答ceo提出的难题 2017年5月15日星期一05:04:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.

CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.

CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?

To read this article in full, please click here

//m.banksfrench.com/article/3196805/how-cisos-can-answer-difficult-questions-from-ceos.html 17年5月15日当周的新产品 2017年5月15日星期一02:07:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章类=“幻灯片”> <图类=“幻灯片”> < figcaption >新产品本周< / figcaption > < img data-imageid = " 100722476 " src = " http://images.techhive.com/images/article/2017/05/intro - 100722476 - orig.jpg“data-thumb-src = " http://images.techhive.com/images/article/2017/05/intro - 100722476 - orig.jpg“alt = "本周的新产品" / > < p class = " slideCredit " >图像类< span = " slideCreditText " >阵列< / span > < / p > < div class = " slideBody " > < p >我们的有趣的新产品。阅读如何提交条目到网络世界的本周产品幻灯片。足球竞猜app软件< / p > < / div > < /图> <图类=“幻灯片”> < figcaption > FastCollect档案Commvault版< / figcaption > < img data-imageid = " 100722477 " src = " http://images.techhive.com/images/article/2017/05/archive360 - 100722477 - orig.jpg“data-thumb-src = " http://images.techhive.com/images/article/2017/05/archive360 - 100722477 - orig.jpg“alt = " archive360 " / > < p class = " slideCredit " >图像类< span = " slideCreditText " > archive360 < / span > < / p > < p class = " jumpTag " > < a href = " /文章/ 3196361 / new-products-of-the-week-5-15-17。要完整阅读这篇文章,请点击这里

//m.banksfrench.com/article/3196361/new-products-of-the-week-5-15-17.html
Citrix CSO问答:如何处理多代员工之间的安全问题 2017年5月12日星期五04:28:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations working side by side at Citrix – and a fourth on the way. Citrix has 9,500 employees with 51 percent being Millennials. With each generation comes a new security challenge that employers need to be overcome so that eventually enterprise security is second nature by the time future generations are in the workforce. CSO Managing Editor Ryan Francis recently asked Black how these challenges can be lessened in future generations.   

What is the biggest security issue you see of new employees?

To read this article in full, please click here

//m.banksfrench.com/article/3196386/qa-citrix-cso-how-to-deal-with-security-across-multiple-generations-of-employees.html
顶级DRaaS公司观看 2017年5月10日星期三05:40:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章> <节类= “网页”>

Forrester研究最近发布了报告命名Sung盯AS,Bluelock,IBM和iland作为顶级容灾作为一种服务公司

随着企业期待他们。在任何时候都联网了,备份和恢复的关键是保持事物,没有停机平稳运行。随着勒索等待猛扑分钟用户一个链接的点击,公司依靠网络恢复在短短的几分钟而不是几天。

//m.banksfrench.com/article/3195829/top-draas-companies-to-watch.html
供应商批准NIST密码草案 星期二,2017年5月9日9时50分零零秒-0700 瑞安弗朗西斯 瑞安弗朗西斯

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.

The new framework recommends, among other things:

  • Remove periodic password change requirements

There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.

To read this article in full, please click here

//m.banksfrench.com/article/3195339/vendors-approve-of-nist-password-draft.html 6个东西,你需要了解物联网安全 2017年5月9日星期二04:54:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章类=“幻灯片”> <图类=“幻灯片”> < figcaption >安全,信任和数据完整性< / figcaption > < img data-imageid = " 100721773 " src = " http://images.techhive.com/images/article/2017/05/0_iot_intro_smart_appliances - 100721773 - orig.jpg“data-thumb-src = " http://images.techhive.com/images/article/2017/05/0_iot_intro_smart_appliances - 100721773 - orig.jpg“alt =“物联网安全”data-license = "盖蒂图片社" / > < p class = " slideCredit " >图像类< span = " slideCreditText " >思想库< / span > < / p > < div class = " slideBody " > < p >物联网的出现正在改变我们的个人技术安全范式,是客户/业务交互的游戏规则改变者,部分原因是由于广泛的可用数据范围和收集这些数据的设备的绝对数量。麦肯锡和该公司预计,到2025年,物联网生态系统将产生6万亿美元的价值。成功的物联网产品依赖于它们能给企业和消费者带来的利益,同时也为安全、信任和数据完整性建立了相应的基础。物联网技术可以通过多种重要方式降低数据安全风险,同时改善互联世界的客户体验。< / p > < p class = " jumpTag " > < a href = " /文章/ 3195425 / six-things-you-need-to-know-about-iot-security。要完整阅读这篇文章,请点击这里

//m.banksfrench.com/article/3195425/six-things-you-need-to-know-about-iot-security.html
计算机取证追踪罪犯留下的面包屑 周一,2017年5月8日六时09分00秒-0700 瑞安弗朗西斯 瑞安弗朗西斯

The boss gets tipped off that an employee might be leaving the company and in so doing is trying to grab as many clients as possible to take with him to his new job. The company brings in computer forensic specialists to look through the employee’s actions online to find the evidence before confronting the employee.

Alfred Demirjian, president and CEO of computer forensic company TechFusion, has seen that and many other scenarios in the 30 years he has been in the business--anything from an employee sabotaging a former company through hijacking an email account to misusing the internet on company time. Commercial software allows his company to dig deep into an employee’s social media postings and texts, or to track them by GPS if they have a company-owned smartphone.

To read this article in full, please click here

//m.banksfrench.com/article/3195071/computer-forensics-follows-the-bread-crumbs-left-by-perpetrators.html
17年5月8日当周的新产品 2017年5月8日星期一06:00:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯 <文章类= “幻灯片”> <人物类= “滑动”>
一周中的新产品 图像通过<跨度类= “slideCreditText”> Aspect软件

我们的综述有趣的新产品。阅读如何提交条目到网络世界的本周产品幻灯片。足球竞猜app软件

Browser Stored Password Discovery Tool
050817 thycotic

Image by thycotic

To read this article in full, please click here

//m.banksfrench.com/article/3195044/new-products-of-the-week-5-8-17.html 第三方会让你的网络受到攻击 2017年5月5日星期五05:24:00 -0700 瑞安弗朗西斯 瑞安弗朗西斯

Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was breached a few years ago because of an HVAC vendor’s lack of security, the focus continues to be on how to allow third parties access to the network without creating a security hole.

The use of third-party providers is widespread, as are breaches associated with them. Identity risk and lifestyle solution provider SecZetta claims that on average, 40 percent of the workforce make up third parties. A recent survey done by Soha Systems notes that 63 percent of all data breaches can be attributed to a third party. “The increased reliance on third-party employees, coupled with the growing sophistication of hackers, has led to the current identity and access management crisis that most businesses are faced with today — whether they realize it or not,” a SecZetta blog post stated. 

To read this article in full, please click here

//m.banksfrench.com/article/3194832/third-parties-leave-your-network-open-to-attacks.html