Latest Posts


The Necessity of Cloud Delivered Integrated Security Platforms

September 28, 2015 Added by:InfosecIsland News

Forrester Consulting conducted an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from this research, including:

Comments  (0)


A Sharing Economy for Security

September 25, 2015 Added by:Anne Bonaparte

Hackers trade information to make their attacks more effective. If organizations want to beat back the bad guys, they must also learn to share.

Comments  (0)


Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)


3 out of 4 Consumers Will Leave your Websites Because of Security Concerns

September 22, 2015 Added by:Peter Zavlaris

As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.

Comments  (0)


Red Hat Warns of Ceph Website Breach

September 19, 2015 Added by:Eduard Kovacs

Red Hat has detected a breach on two Ceph storage system websites and the integrity of the signing keys has been compromised.

Comments  (0)


The 2015 ICS Cyber Security Conference

September 18, 2015 Added by:Joe Weiss

The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta ( ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....

Comments  (0)


FS-ISAC to Share Threat Intelligence With Federal Reserve Banks

September 16, 2015 Added by:InfosecIsland News

The Financial Services Information Sharing and Analysis Center (FS-ISAC) announced an arrangement with the Federal Reserve Banks to provide direct access to FS-ISAC security threat information to over 10,000 of their financial institution customers.

Comments  (0)


BYOx: Developing and Deploying Effective Strategies to Safeguard Data

September 16, 2015 Added by:Steve Durbin

In today’s global, connected society, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, organizations need to manage risks in ways beyond those traditionally handled by the information security function, since new attacks will impact bot...

Comments  (0)


Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)


Similar Threats, Different Reponses: Report

September 15, 2015 Added by:InfosecIsland News

Both large and medium size businesses face many of the same security threats—but often respond to them differently, a recent study conducted by Bitdefender in the United States reveals.

Comments  (0)