Blog Posts Tagged with "Guidelines"


NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)


Web Application Security: Minimizing the Risk of Attacks

April 19, 2011 Added by:Sasha Nunke

Vulnerabilities in web applications are now the largest source of enterprise security attacks. Web application vulnerabilities accounted for over 55% of all vulnerabilities disclosed in 2010, according to an IBM X-Force study. That may be the tip of the iceberg...

Comments  (0)


Detailed FISMA Logging Guidance

April 14, 2011 Added by:Anton Chuvakin

FISMA emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to secure the information systems that support its operations and assets. Here is what is likely needed for a successful FISMA-driven log management implementation...

Comments  (0)


IETF Provides Guidance on IPv6 End-Site Addressing

April 11, 2011 Added by:Stefan Fouant

Practical conservation may never be needed given the trillions of addresses available in IPv6, but maybe in the very distant future it could very well be due to some of these recommendations being put in place today. After all, 640K did turn out to be a rather small number didn't it?

Comments  (0)


Guidance on Internal Controls, Ethics, and Compliance

April 10, 2011 Added by:Thomas Fox

A benchmark of the elements of an effective compliance program is the OECD's Good Practice Guidance on Internal Controls, Ethics, and Compliance. This article lists 12 specific instructions for companies to utilize as a basis to construct an effective compliance program upon...

Comments  (0)


Assessing Risk II: Attack Modeling to Collect Data

December 21, 2010 Added by:Danny Lieberman

Attack modeling is based on the notion that any system has assets of value worth protecting. These assets have certain vulnerabilities. It is a given that internal and external attacks exist, that may exploit these vulnerabilities in order to cause damage to the assets...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »