Latest Posts

Af2c9843333cc1e2578ddf18b3eed066

Concerns over Brand Security are Escalating

June 03, 2015 Added by:Peter Zavlaris

The unprecedented technological advancement seen over the last two decades has become a double-edged sword. As a result, information security has gone from being a tertiary IT function to a significant operational risk.

Comments  (0)

959779642e6e758563e80b5d83150a9f

What is PHI?

June 03, 2015 Added by:Danny Lieberman

Software Associates specialize in HIPAA security and compliance for Israeli medical device companies – and 2 questions always come up: “What is PHI?” and “What is electronically protected health information?”

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Two's (Or More) Company: How to Use Two-Factor Authentication the Right Way

June 03, 2015 Added by:Patrick Oliver Graf

These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

Attack of the Home Router

June 02, 2015 Added by:Robert Vamosi

The security of any network is only as strong as its weakest link. What if that weak link is so fundamental that most of us may not even consider it to be faulty?

Comments  (0)

0ead717779244d9aab5c1699308850d2

Bad Bots' Impact on Mobile Web Traffic Rose in 2014: Research

June 02, 2015 Added by:Brian Prince

Bots are busy little bees on the Internet, and the world of mobile computing may be their next frontier.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Unknown Operational Effectiveness of Security Analytics Tooling

June 02, 2015 Added by:Anton Chuvakin

What it all means is that you are buying on faith. There is nothing wrong with it, by the way, but it is useful to be honest about it…

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Number of Botnet-Powered DDoS Attacks Dropped in Q1: Kaspersky

June 01, 2015 Added by:Eduard Kovacs

Kaspersky Lab has published a report detailing the botnet-assisted distributed denial-of-service (DDoS) attacks launched by malicious actors in the first quarter of 2015.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Zero-Day Export Regulation Proposal Released for Public Comment

June 01, 2015 Added by:Anthony M. Freed

The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has released the proposal for regulatory control of the export of malware and zero-day exploits for a sixty-day public comment period, and the reaction from the security community and other interested parties is already definitively negative.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Digital Forensics and the Futuristic Scene-of-Crime

June 01, 2015 Added by:Tripwire Inc

We must also keep a clear mind on one important fact: to acquire what can be dynamic and intangible, and time sensitive artifacts in the early stages of an investigation presents of highest opportunity of success.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

More Possible Common Threads in Major ICS Cyber Incidents – Unintended System Interactions

June 01, 2015 Added by:Joe Weiss

One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”.

Comments  (0)