netForensics Celebrates 10 Years in the Federal Community with Federal...
netForensics today announced their 2010 Federal Customer User Group marks the company's 10th anniversary of providing security solutions to the federal market. The nFX Federal User Group is taking...
View ArticleSTUDY REVEALS 80% OF RESPONDENTS FEEL NETWORK THREATS WILL INCREASE IN 2010...
netForensics today announced a new study, entitled "Security in a Down Economy: Limited Budgets, Less Staff, More Threats," shows a perceived increase in network threats throughout 2010 and into 2011....
View ArticlenetForensics Joins the Cisco Developer Network and Completes Cisco...
netForensics today announced that it has joined the Cisco Developer Network as a Registered Developer within the network security technology category. In addition, netForensics nFX Cinxi One v4.1 has...
View ArticlePrevention, Detection, and Reaction: What Works Best?
It's a dangerous place out there--the cyberworld, that is. We have witnessed unparalleled changes and growth over the last decade, yet with these changes and growth have come an increasing number of...
View ArticleNJTC Annual Membership Meeting
Not so long ago, I remember that talking about information security management brought a lot of eyebrowse up, something of a black art, kind of like UNIX Administration. But in today's world, Cyber...
View ArticleSmart Meter Papers from Ross Anderson and Shailendra Fuloria
This morning I posted a link on our twitter site about an article from Ross Anderson and Shailendra Fuloria on issues concerning the Governance and Security of Smart Meters. "Who controls the off...
View ArticleSIEM Tools: They Are not All Created Equal--Part 1
I don't like to admit this, but I am not always as tolerant as I would really like to be. Certain things that people do and say sometimes catch my attention and cause me to think less of them. An...
View ArticleDiscussions on Risks with Embedded Medical Devices at the ISPAB
Jaren Doherty serves as both chief information officer and associate deputy assistant secretary for cybersecurity at the Department of Veterans Affairs. In his current position, Doherty led the...
View ArticlenetForensics' nFX Cinxi One Earns Perfect Score in SC Magazine Product Review
netForensics today announced that nFX Cinxi One, its powerful SIEM and log management appliance, has earned five out of five stars in SC Magazine's August 2010 product review. In its group test of...
View ArticleDigital Object Memories in the Internet of Things
This workshop being held in Denmark on Sept. 26th, 2010 on Digital Object Memories. at the Ubiquitous Computing Conference The integration between biological technology and nano-technology should be...
View ArticleProcrastinators and SIEM Technology
Procrastinators never cease to amaze them. They seem to have a ready excuse (no matter how lame) for every inaction and delay. Having taught in universities for many years, I found that procrastination...
View ArticlenetForensics Sees Double-Digit Growth in MSSP Revenues
netForensics today announced that the company exceeded expectations with MSSP revenues up 50%, resulting in another profitable quarter. Driven by key strategic relationships and product enhancements...
View ArticleMistakes in Incident Response: Part 1
Incident response is generally defined as actions taken to protect and restore the normal operating condition of computers and the information stored in them when an adverse event occurs. The goal is...
View ArticleMistakes in Incident Response: Part 2
In my previous blog posting I defined incident response, described why it is so important, and then presented six of the most serious mistakes in incident response that people and organizations too...
View ArticleInformation Security Governance - Hybrid Security Cloud Provider Services and...
Information Security Governance - Hybrid Security Cloud Provider Services and Security Team Management Collaboration and Trust. One of the most important elements of Information Security Management is...
View ArticleRSA 2011 Keynote address and Dr. Michio Kaku
Dr. Michio Kaku's keynote address at the RSA conference was full of thoughts on what the near future holds for us in the way of technology breakthroughs. Dr. Kaku quoted Woody Allen on eternity,...
View ArticleRSA Conference 2011 - Hugh Thompson Show
The Hugh Thompson show has been part of the RSA closing for the last 5 years this year one of his closing guests was Alex Conran who has the BBC show "The Real Hustle" demonstrates to the audience just...
View ArticleCertificate Authorities and Cloud Services
In the recent Article published by CRN Comodo Attack Sparks SSL Certificate Security Discussions. Brian Price writes about the Security and Trust of Internet Certificate Authorities "A spotlight on one...
View ArticleMSPs Embrace the Virtual Firewall
The adoption of virtual firewalls and IDSs has begun to rapidly accelerate among Managed Security Service Providers. Virtual devices, including Juniper Vsys, Cisco ASA Virtual Context Features,...
View ArticleSecurity Incidents - Suspicious Activities and Formal Investigations
Today's privacy laws, breach notifications, and other compliance requirements have further escalated the role of incident management in an effective security strategy. It is no longer enough to just...
View Article
More Pages to Explore .....