If, as I discussed in one of my last posts, we can’t rely on compliance standards for anything more than setting the minimum bar for establishing our security measures, we are back to having to do the difficult trade off analysis on the real impact of security on productivity versus the benefits. And while there is no simple answer on how to do that analysis, there may be a different way to frame the problem.
No, we are not talking about a new John Carpenter movie or tabloid headline, although this is the headline I would love to see. The real headline is that hackers found a way to hijack root for Google Android and injected malware into 21 applications.
We recently expanded our cloud-based security offerings with Retina Cloud, so I figured it was time to post my first blog on eEye and the cloud. eEye has been providing vulnerability scanning using a SaaS model since 2009 and today, we offer customers a variety of options with respect to vulnerability scanning from the “cloud”….
Please use the “Leave a Reply” function below and tell us your comments, thoughts, and suggestions about VEF. – One person will be selected at random to win a new Amazon Kindle and $25 gift card – Deadline to be entered into the VEF contest is Friday 03/11 at noon PST. – Please note that all…
Believe it or there are people out there that aspire to be hackers. Not just the run of the mill, crack a password or two, but a bona fide Neo who can play with your secure data like a personal version of the matrix.
Before I get started today, I want to first point out that tomorrow’s Vulnerability Expert Forum (VEF) will be at a new time – 1PM PST. Sign up to hear what Marc Maiffret and the eEye Research team have to say about today’s security bulletins and other security related topics. For this Patch Tuesday, Microsoft…
I’ve been a loyal customer of Wells Fargo for over a decade. For lots of good reasons. Over the long President’s Day weekend was the first time I’ve received a call from them saying that one of the vendors I’ve paid recently has had a data breach and leaked my credit card information.
I couldn’t resist one last homage to classic rock. This time Lou Reed sings “everybody had to pay and pay; a hustle here and a hustle there…hey babe, take a walk on the wild side” while we chat about the right, wrong and wild side of the dreaded audit.
One of the blogs we like to read is the so called “Security Warrior”, who recently wrote a great summary and counterargument to a discussion on logging in the cloud that includes links to some of the industry’s back and forth.
A few weeks ago in my blog, I mentioned a critique regarding targeted vulnerability assessment and its ability to not identify rogue devices. Anytime you have definitive host list (by host name or from Active Directory for example), or a fixed set of IP addresses (versus ranges) you can potentially miss devices connected to your…