-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: September 2014
Data protection and information security difference
According to experts from network security company in Computer Security we must distinguish between, Information Security and Data Protection. One must distinguish between the two, because they form the basis and reason, justify the selection of data elements that require … Continue reading
Posted in Uncategorized
Leave a comment
Protección web con pruebas de penetración
Una prueba de penetración, pentest es un método de evaluación de la seguridad de un sistema informático mediante la simulación de un ataque. Una prueba de penetración de aplicaciones web para seguridad de datos se centra sólo en la evaluación … Continue reading
Posted in Uncategorized
Leave a comment
PayPal ad campaign hits Apple on payment security
PayPal took out an assertive full-page ad in the New York Times Tuesday questioning the security of Apple’s new payment system, Apple Pay. The ad reads: “We the people want our money safer than our selfies,” a reference to the … Continue reading
DoS Scans Spoof Google Public DNS Server
The SANS Internet Storm Center this afternoon reported SNMP scans spoofed from Google’s public recursive DNS server seeking to overwhelm vulnerable routers and other devices that support the protocol with DDoS traffic. “The traffic is spoofed, and claims to come … Continue reading
With Data Security Company, leave no stone unturned
The data security and confidentiality of information are a must. Privacy in this field must be taken into account when defining corporate strategy and data management that incorporate best practices on Data Security from premature stages of planning is the … Continue reading
Seguridad de aplicaciones web con ayuda de curos de seguridad
Seguridad del Sitio Web se ve a menudo incorrectamente como un conjunto de problemas de seguridad basadas en host del servidor y, en lugar de a nivel de código y las vulnerabilidades de seguridad basadas en configuración que alguien puede … Continue reading
Posted in Uncategorized
Leave a comment
PCI Council updates skimming prevention guidance
PCI SECURITY STANDARDS COUNCIL PUBLISHES MERCHANT GUIDANCE ON SKIMMING PREVENTION — Resource for retailers and others that handle payment card data updated to address memory scrapers, mobile device weaknesses, EMV chip cards and other new attack source:https:https://www.pcisecuritystandards.org/pdfs/14_09_10_Skimming%20Guidance%20Press%20Release.pdf information security training
What has changed in Information Security
We must understand and accept at the outset that the situation is not the same as a decade ago, when this discipline was booming. Today the security requirements of organizations demand a radical change in penetration testing to provide them … Continue reading
Correo empresarial en la nube y seguridad
Email han sido durante mucho tiempo uno de los primeros lugares las empresas han buscado la externalización a la Computación en la Nube. Esto hace mucho sentido: Pocas empresas están en el negocio de proporcionar correo electrónico (con la excepción … Continue reading
HealthCare.gov hacked
The Obama administration says hackers breached HealthCare.gov, but no consumer information was taken in the attack on the health insurance website that serves more than 5 million Americans. Instead, hackers installed software that could have been used to launch an … Continue reading