Intel Security

Afficher toutes les publications

Filtrer le contenu :

Hide English Publications

Real-World Data Breach Protection Techniques

This white paper explains the strategies and techniques used by McAfee Network Data Loss Prevention to protect data-in-motion. Understand the importance of both the content and context of sensitive data when detecting and preventing data exfiltration.
Sujets : Foundstone

Secure Coding for Android Applications (English)

More than one billion Android devices have been activated to date, and it’s estimate that 1.4 million devices are activated per day. The rapidly increasing popularity of this mobile OS demands that developers understand how to create secure Android applications. This white paper focuses on secure coding practices for Android applications.
Sujets : Foundstone

PCI Guidance: Microsoft Windows Logging (English)

This paper discusses what is involved in establishing logging for Microsoft Windows systems, and discusses how those settings will also be useful in detecting system anomalies that could be indicative of system misuse or even a system breach.
Sujets : Foundstone

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked (English)

How familiar are you with low-hanging fruit — the easiest ways for attackers to gain entry to your network and potentially run off with your valuable data? This white paper explores penetration tests that you can perform at your organization to gain an understanding of how to apply the proper defenses to prevent exploitation of the top five low-hanging fruit.
Sujets : Foundstone

La conformité au service de la sécurité

This paper will illustrate how a well-structured security governance program with fully developed and implemented policies, plans, and procedures will strengthen an organization’s security posture.
Sujets : Foundstone

A Pentester's Guide to Hacking ActiveMQ-Based JMS Applications (English)

Enterprise messaging systems (EMS) are highly reliable, flexible, and scalable systems that allow asynchronous message processing between two or more applications. This paper provides guidance on penetration testing techniques to assess the security of ActiveMQ-based EMS written using the Java Message Service API.
Sujets : Foundstone

Building & Maintaining a Business Continuity Program (English)

Business continuity planning is a critical function that involves many different personnel and departments over multiple phases. As with many business continuity programs, an iterative process is most effective in developing a refined set of procedures and plans.
Sujets : Foundstone

Creating and Maintaining a SOC (English)

Organizations are investing in the development of security operations centers (SOCs) to provide increased security and rapid response to events throughout their networks. But building a SOC can be a monumental task. This paper explains how strong people and well-defined processes can result in an operationally effective SOC.
Sujets : Foundstone

McAfee ePolicy Orchestrator: Creating an Apache HTTP Repository (English)

This document describes how to configure Apache and Samba running on a Linux operating systems (OS) platform for the purpose of creating an Apache HTTP Repository for McAfee ePolicy Orchestrator. The Apache repository will allow customers to meet the requirement to have a Linux repository.
Sujets : Foundstone, Gestion de la sécurité

A Pentester’s Guide to Hacking OData (English)

The Open Data Protocol (OData ) is an open web based RESTful protocol for querying and updating data. This paper discusses OData penetration testing methodology and techniques.
Sujets : Foundstone