Introduction to Security Threat Modeling

/
Recently reviewed Security threat modeling, or threat modeling, is a process of assessing and documenting a system’s security risks. Security threat modeling enables you to understand a system’s threat profile by examining it through the eyes of your potential foes. With techniques such as entry point identification, privilege boundaries and threat trees, you can identify strategies to mitigate potential threats to your system. Your security threat modeling efforts also enable your team to justify security features within a system, or security practices for using the system, to protect your corporate assets.

Iran seen behind cyber attacks on US banks

/
Experts in the U.S. say they believe Iran’s government is behind this week’s cyber attacks on American banks, not hackers who blamed an anti-Islam film. NBC’s Robert Windrem and Jim Miklaszewski have the story.

Private U.S. networks vulnerable to cyber attack: Pentagon

/
Privately-owned U.S. computer networks remain vulnerable to cyber attacks, and many U.S. companies are not doing enough to protect them, Deputy U.S. Defense Secretary Ashton Carter said on Wednesday.

Privacy Threat Model for Mobile

/
Evaluating privacy vulnerabilities in the mobile space can be a difficult and ad hoc process for developers, publishers, regulators, and researchers. This is due, in significant part, to the absence of a well-developed and widely accepted privacy threat model.

Microsoft Urges Customers to Install Security Tool

/
Microsoft Corp urged Windows users on Monday to install a free piece of security software to protect PCs from a newly discovered bug in the Internet Explorer browser.

Laptop Security Tips: How to Keep it From Getting Lost or Stolen

/
Treat your laptop like cash Get it out of the car, don't ever leave your laptop behind Keep it locked, use a security cable Keep it off the floor, or at least between your feet. Keep passwords somewhere else, not near the laptop or case Don't leave it “for just a sec” no matter where you are Pay attention in airports, especially at the security check If you have an alarm, turn it on

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 3/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 2/3

/
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security. Its aim, in plain terms, is to improve the usability of security features in end user applications.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 1/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

FedCyber.com Cyber Security Summit – Confronting the Next Generation of Cyber Security Challenges and Opportunities

/
The Second Annual FedCyber.com Cyber Security Summit provides a venue for our nation's most seasoned cyber security practitioners to come together to work issues of common concern.