Vous êtes ici :   Accueil » RSS - net-security.org
 
Prévisualiser...  Imprimer...  Imprimer la page...
!Introduction
Technique
Outils
Base de connaissances
Visites

 1574536 visiteurs

 3 visiteurs en ligne

Contact

Notre site
griessenconsulting-Tag-Qrcode.png

info@griessenconsulting.ch

ch.linkedin.com/in/thierrygriessenCISA

Neuchâtel, Suisse


Mes coordonées
griessenconsulting-Tag-Vcard-OK.png

Crée votre Code

RSS - net-security.org

Help Net Security


Daily information security news with a focus on enterprise security.


ETSI releases cryptographic standards for secure access control  Voir?

ETSI Technical Committee on Cybersecurity has recently released two specifications on Attribute-Based Encryption (ABE) that describe how to protect personal data—with access controls. ABE is a cryptographic scheme that bundles access control with data encryption. In such a system, data can be decrypted if the set of attributes of the user key matches the attributes of the encryption. For instance, access to employee pay data will be granted to the role of Human Resources Employee … More

The post ETSI releases cryptographic standards for secure access control appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2018 @ 00:18)

How often are users’ DNS queries intercepted?  Voir?

A group of Chinese researchers wanted to find out just how widespread DNS interception is and has presented the result of their large-scale study to the audience at the Usenix Security Symposium last week. The problem Most Internet connections are preceded by a DNS address lookup request, as the Domain Name System (DNS) “translates” human-readable web addresses to IP addresses. DNS queries from clients are handled by recursive nameservers and, usually, users’ recursive nameservers are … More

The post How often are users’ DNS queries intercepted? appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 21:46)

YL Ventures expands advisory board with 24 cybersecurity executives  Voir?

YL Ventures, the Silicon Valley headquartered seed-stage venture capital firm focusing on Israeli cybersecurity innovation, announced a major expansion of its Venture Advisory Board. The four existing advisors (Tom Baltis, CISO of Delta Dental Insurance; Andy Ellis, CSO of Akamai; Amichai Schulman, co-founder of Imperva Inc.; and Justin Somaini, CSO of SAP) will be joined by an additional 24 CISOs and cybersecurity experts, including: Colin Anderson, CISO of Levi, Strauss & Co. Tomasz Chowanski, CISO, … More

The post YL Ventures expands advisory board with 24 cybersecurity executives appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 21:00)

Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns  Voir?

The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturing sector is steadily getting more and more targeted. According to the statistics from the company’s latest threat report, compiled from alerts validated by its Managed Detection and Response team and data from its Project Sonar (Internet scanning for vulnerable systems) and Project Heisenberg (150+ honeypot nodes watching for signs of attacker … More

The post Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 18:00)

Researchers convert QR codes into complex 3D features to foil IP pirates  Voir?

The worldwide market for 3D-printed parts is a $5 billion business with a global supply chain involving the internet, email, and the cloud – creating a number of opportunities for counterfeiting and intellectual property theft. Flawed parts printed from stolen design files could produce dire results: experts predict that by 2021, 75 percent of new commercial and military aircraft will fly with 3D-printed engine, airframe, and other components, and the use of AM in the … More

The post Researchers convert QR codes into complex 3D features to foil IP pirates appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 15:06)

How to develop the right strategy to increase IoT security  Voir?

As more and more devices become connected, many industries that were previously secure are experiencing new threats or attacks to their devices and services. In this podcast recorded at Black Hat USA 2018, Mark Hearn, Strategic Business Development Manager, IoT Security at Irdeto, talks about how IoT connectivity opens you up to new cybersecurity risks, and offers insight on how to protect IoT platforms. Here’s a transcript of the podcast for your convenience. Good afternoon. … More

The post How to develop the right strategy to increase IoT security appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 14:15)

Let user experience guide your security requirements  Voir?

If you’re like most business leaders, you try to do everything you can to keep your company’s information safe. You tell your employees to use strong passwords and offer regular trainings on phishing and the importance of internet security. You even make them change their passwords every six months or three months. Although you know no system is foolproof, your rules should be as strict as possible in order to prevent a breach. Or should … More

The post Let user experience guide your security requirements appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 14:00)

SUSE and Microsoft collaborate to deliver enterprise Linux kernel optimized for Azure  Voir?

SUSE announced the availability of the enterprise Linux kernel tailored for Microsoft Azure. SUSE Linux Enterprise Server 15 on-demand instances now run on a custom-tuned kernel for workloads on Microsoft Azure that provides performance and boot speeds along with a decreased memory footprint. The Azure-tuned kernel enables access to new and upcoming Azure features, helping customers to be more agile. SUSE is working with Microsoft and other partners to adapt and secure open source solutions … More

The post SUSE and Microsoft collaborate to deliver enterprise Linux kernel optimized for Azure appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 13:52)

CloudPassage debuts Halo Cloud Secure, delivering security of public cloud infrastructure  Voir?

CloudPassage announced the general availability of Halo Cloud Secure, which offers protection of public cloud infrastructure, delivering security and DevOps teams a “single pane of glass” view of security and compliance across all of their cloud service provider (CSP) accounts. Organizations face an increase in vulnerabilities as security teams struggle to maintain visibility into public cloud infrastructure. Maintaining security visibility of dynamic computing environments can be difficult due to decentralization of the IT department, the … More

The post CloudPassage debuts Halo Cloud Secure, delivering security of public cloud infrastructure appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 13:52)

BearingPoint makes strategic investment in Insignary  Voir?

BearingPoint has made a strategic investment in Insignary. It marks BearingPoint’s first time investing in an Asian start-up. As part of its Ventures activities, the investment builds on BearingPoint’s partnership with Insignary, through which they offer managed binary code scanning service in Europe. The funding will enable Insignary to meet the growing demand in the EU, the US and Asia for businesses looking to improve their open-source software (OSS) risk management. Insignary’s software-as-a-service (SaaS) and … More

The post BearingPoint makes strategic investment in Insignary appeared first on Help Net Security.

... / ... Lire la suite

(21/08/2018 @ 05:00)

Dernière mise à jour : 21/08/2018 @ 23:16