Top Stories

201d6e4b7cd0350a1a9ef6e856e28341

The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid

July 31, 2015 Added by:Joe Weiss

The recent Lloyd’s report on cyber implications of the electric grid serves an important need to understand the insurance implications of a cyber attack against the electric grid. Unfortunately, I believe the technical aspects of the hypothesized attack in the Lloyd’s study are too flawed to be used.

Comments  (0)

Latest Posts

201d6e4b7cd0350a1a9ef6e856e28341

The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid

July 31, 2015 Added by:Joe Weiss

The recent Lloyd’s report on cyber implications of the electric grid serves an important need to understand the insurance implications of a cyber attack against the electric grid. Unfortunately, I believe the technical aspects of the hypothesized attack in the Lloyd’s study are too flawed to be used.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Debunking Myths: Application Security Checklists Suck

July 31, 2015 Added by:Rohit Sethi

There is a pervasive sentiment amongst the security community about checklists: they suck. We’ve all seen inflexible audit checklists that seem to be highly irrelevant to the specific system being audited.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

How to Tell a Landscaper From a Thief

July 20, 2015 Added by:Or Katz

Casually dismissed attack reconnaissance should be considered as valuable information and should be treated as such.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

Universities at risk of Data Breaches: Is it Possible to Protect Them?

July 17, 2015 Added by:Alexander Polyakov

As all university networks are complex and consist of numerous modules and there are numerous vulnerabilities in them, protecting them seems a nightmare for any IT team. Cybersecurity is not some separate steps taking from time to time, but the ongoing process.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Understanding the Strengths and Limitations of Static Analysis Security Testing (SAST)

July 17, 2015 Added by:Rohit Sethi

While static analysis is a very valuable technology for secure development, it is clearly no substitute for building applications with security in mind from the start.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

B8645aab12b6ba5e561fccefbf46cc0c

Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Elusive HanJuan EK Drops New Tinba Version (updated)

June 25, 2015 Added by:Malwarebytes

Dutch security firm Fox-IT has identified the payload as a new version of Tinba, a well-known banking piece of malware.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

VERT Vuln School: Return-Oriented Programming (ROP) 101

June 25, 2015 Added by:Tripwire Inc

In the beginning, there were stack buffer overflows everywhere.

Comments  (0)