Blog Posts Tagged with "Guidelines"

69dafe8b58066478aea48f3d0f384820

NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Web Application Security: Minimizing the Risk of Attacks

April 19, 2011 Added by:Sasha Nunke

Vulnerabilities in web applications are now the largest source of enterprise security attacks. Web application vulnerabilities accounted for over 55% of all vulnerabilities disclosed in 2010, according to an IBM X-Force study. That may be the tip of the iceberg...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Detailed FISMA Logging Guidance

April 14, 2011 Added by:Anton Chuvakin

FISMA emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to secure the information systems that support its operations and assets. Here is what is likely needed for a successful FISMA-driven log management implementation...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

IETF Provides Guidance on IPv6 End-Site Addressing

April 11, 2011 Added by:Stefan Fouant

Practical conservation may never be needed given the trillions of addresses available in IPv6, but maybe in the very distant future it could very well be due to some of these recommendations being put in place today. After all, 640K did turn out to be a rather small number didn't it?

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Guidance on Internal Controls, Ethics, and Compliance

April 10, 2011 Added by:Thomas Fox

A benchmark of the elements of an effective compliance program is the OECD's Good Practice Guidance on Internal Controls, Ethics, and Compliance. This article lists 12 specific instructions for companies to utilize as a basis to construct an effective compliance program upon...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Assessing Risk II: Attack Modeling to Collect Data

December 21, 2010 Added by:Danny Lieberman

Attack modeling is based on the notion that any system has assets of value worth protecting. These assets have certain vulnerabilities. It is a given that internal and external attacks exist, that may exploit these vulnerabilities in order to cause damage to the assets...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »