5 Top Targets for Today’s Hackers


Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the activity at this year’s show, that actually might be something of an understatement.

From the defense of government surveillance delivered by NSA Director General Keith Alexander to briefings on the coming “cryptopocalypse” and the risks associated with embedded devices and the Internet of Things, Black Hat reminds us that a little bit of paranoia is warranted in today’s connected world.

Here are my leading candidates for surprising, damaging ways criminal hackers are breaching our online security and validat…

This Week’s Five: Security Begins At Home


This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic every week. This week, we explore the risks of security breach and importance of data protection in enterprise networks.

Cyber thieves of all kinds have made the lives of the people in charge of data security miserable; except when they get caught. In today’s world, organizations cannot afford to sit back and assume that “this won’t happen to us”. It is important to be prepared for impending breaches in security. So here is our advice: Secure your network, starting today!

In this special compendium of articles, we take a look at some of the important write-ups on securit…

Guest Post: How ‘Credit Union of Denver’ secures its network and provides business continuity to their customers…cost-effectively!


By Benjamin Shumaker, Vice President of IT/ISO at Credit Union of Denver

Benjamin Shumaker, VP of IT/ISO at Credit Union of Denver

ManageEngine EventLog Analyzer and ManageEngine Firewall Analyzer offers a huge set of features, strong configuration capabilities and outstanding auditing ability that allows our Information Technology group to have the necessary tools regulators expect.

Both Firewall and Event Log Analyzer are the best cost effective tools for getting the most for your money that I was able to find.  Its uses in our enterprise are endless.

Using Firewall Analyzer for conducting forensic analysis of a Trojan attack

Firewall Analyzer saved us hours of research during a discovered Trojan attack. After researching the Trojan it was discovered t…

The Perils of Non-Compliance


The word ‘compliance’ has come a long way in the English dictionary. It might have started as yet another addition to the vocabulary, but now the image it conjures up – little would have the people who coined this word foreseen this evolution.

SOX, HIPAA, PCI, FISMA, GLBA… and considering the probability of the future Enrons, this list is only expected to grow. However, since many organizations have taken active steps to adhere to the compliance-rules, transactions on the web have become a lot safer than they used to be! Companies will surely not want to take the risk of being non-compliant…not if they have to face dire consequences!

You’ll have to face those dubious ‘CNN moments,’ where you

Security Software Spending and Uncertain Times of Economy


The Economic Condition

After the down slide of US economy, there is lull now. Even the noted economist are not sure which way it will turn. Even in the uncertain economic times, the IT security cannot be compromised. It is a good sign that the companies are considering the IT/data security far too important. 

Gartner Survey Results

This is evidently clear from the results of the recent Gartner survey on budget allocation towards security software and services. Definitely there will be  an increase. It is around 4%. Even though there is an increase in budget, the increase is limited. But during the tough times, you do not have the luxury of big budget. The limited budget, the companies can set aside, ne…

Security Vs Operational efficiency – Striking the balance with productive tools


Running through my daily read lists, while on Network World Asia I came across the featured article ‘How to maintain security without increasing the operational load on IT staff‘ by Joe Golden an IT manager. Golden’s pain points were his increasing network load and minimal staffing to handle this load.

This didn’t surprise me at all, I hear many IT managers and administrators with the same woes. More users are logging into the network, applications are many and devices of all types are jostling for network space. Almost like an out of control crowd at a rock concert with the bouncers trying their best to keep them storming the stage or from starting a brawl.They are valid ticket holder…