Quantcast
Channel: SecureState » Data Security
Browsing all 32 articles
Browse latest View live

What We Do Series: Decide How to Backup Our Data

Begin Blog: 13:20 EST; Shutting down Windows 7 Professional Edition The reason for today’s restart is that I was attempting to backup data to one of our network drives when I discovered that I could...

View Article


Image may be NSFW.
Clik here to view.

What We Do Series: Organizing FTP Logs

Begin Blog:  10:54am EST I cannot remember the last time I actually reviewed FTP logs…. The layout of the ISS FTP log format (W3C) is well documented, but that was not the issue today. We are reviewing...

View Article


Image may be NSFW.
Clik here to view.

It is Time to Stop Crossing the Line; A Risk Perspective

Time after time users are getting bit by not implementing a simple, but elusive concept; egress filtering and segmentation. With all the recent news about new variants of the Backoff POS malware, what...

View Article

P.F. Chang’s Breach and the List of Unanswered Questions

Nearly two months ago, security blogger Brian Krebs broke the news about a credit card data breach at the chain restaurant P.F. Chang’s. This week the company’s CEO has posted an update regarding the...

View Article

Image may be NSFW.
Clik here to view.

Unraveling the Onion: A New Take on Defense-in-Depth

Like most areas of study, there are certain analogies that we learn as students that stick with us for the rest of our careers. In medical school, you might learn to associate the circulatory system...

View Article


Image may be NSFW.
Clik here to view.

Weak Passwords | Defensive Readiness Program (DRP)

As we mentioned in the introduction to this blog series, SecureState has reviewed years of data in order to develop these attack vector results. By a decisive margin, weak passwords is clearly the...

View Article

Image may be NSFW.
Clik here to view.

Who is going to be the next “Biggest Loser”?

All too often I hear the phrase, “compliance does not equal security”.  While this statement is absolutely true, the statement in itself does not provide sufficient context.  Compliance does not equal...

View Article

Two More Cases of Threat Visibility

As Jason mentioned in his post, last week brought yet more breaches to light in the form of Community Health Systems and now UPS Stores. To be fair, the UPS Stores breach affects a much smaller...

View Article


Beware: Backoff Malware Not to Be Taken Lightly

The government has been issuing warnings for a month now, and finally organizations are beginning to listen. On Friday, The Department of Homeland Security (DHS) published a release encouraging...

View Article


Fear, Greed & Curiosity:

Within the last few years, there has been growing popularity in social engineering attacks. We have experienced a change in both end user and attacker behavior, resulting in adaptations in attack...

View Article

One More Data Breach: Are We Desensitized Yet?

Home Depot is reporting that it could be the point of origin for a massive credit card breach. Multiple banks, correlating compromised accounts, hint that the large home improvement retailer’s 1,977 US...

View Article

High Turnover Equals Increased Risk

After the revelation that over 76 million users and 7 million businesses were affected by the recent JP Morgan Chase & Co. (JPM) data breach, many observers are wondering what lessons can be...

View Article
Browsing all 32 articles
Browse latest View live