IEEE Quantifying and Verifying Reachability for Access Controlled Networks
Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenance, and design. Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown. In this paper, we propose a suite of algorithms for quantifying reachability based on network configurations [mainly Access Control Lists (ACLs)] as well as solutions for querying...
IEEE Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of a fully trusted key generation center, and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges effectively. In this paper, we circumvent these obstacles and close this gap by ...
Rootsecure.net Offensive Security: FreePBX Exploit Phone Home
Rootsecure.net Acros Security: Adobe Reader X (10.1.2) msiexec.exe Planting
BBC Twitter boosts security after hacks
Micro-blogging site Twitter says it is bringing in a two-step login for users to beef up security following recent high-profile breaches.
Network World Experts: What to expect after cybersecurity executive order
U.S. government agencies will need the help of companies while developing a set of cybersecurity standards that President Barack Obama has called for in an executive order signed last month, administration officials said.
Network World US NIST: Industry should lead creation of cybersecurity framework
The U.S. government agency leading an effort to create a voluntary cybersecurity framework for companies operating critical infrastructure wants to hear ideas about what to include in those standards.
Network World Java's security problems unlikely to be resolved soon, researchers say
Since the start of the year, hackers have been exploiting vulnerabilities in Java to carry out a string of attacks against companies including Microsoft, Apple, Facebook and Twitter, as well as home users. Oracle has made an effort to respond faster to the threats and to strengthen its Java software, but security experts say the attacks are unlikely to let up any time soon.
ITtoolbox Voice Network Security - Strategies for Control
With voice traffic now running across the data network, the burden of safeguarding voice systems now lies in the hands of the networking team. Read this white paper to learn to secure your voice network now.
ITtoolbox How Xsigo Enhances VMware Deployments
XS International presents this whitepaper on how the virtual I/O capabilities of the Xsigo I/O Director enable a virtualized datacenter running VMware ESX to scale better, ensure security through traffic isolation, and guarantee performance through QoS. Together, these benefits allow a greater percentage of applications to run in virtual machines, further reducing the need for physical servers that consume power and real estate.
About our headline feed