Top Stories

E313765e3bec84b2852c1c758f7244b6

3 Things I Learned Talking to InfoSec People About Crime

March 30, 2015 Added by:Brent Huston

There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.

Comments  (0)

6d117b57d55f63febe392e40a478011f

NIST: Internet of Things Hampered by Lack of Effective Timing Signals

March 31, 2015 Added by:Anthony M. Freed

As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Enterprise Security Pros Embracing Threat Intelligence, But Question Reliability: Survey

March 31, 2015 Added by:Brian Prince

While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.

Comments  (0)

Latest Posts

0ead717779244d9aab5c1699308850d2

30 Percent of Companies Would Negotiate Data Ransom With Cybercriminals

April 01, 2015 Added by:Brian Prince

Negotiating with criminals is risky, but it is apparently a risk some people are willing to take if it is going to get them their data back.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

mDNS Can Be Used to Amplify DDoS Attacks: Researcher

April 01, 2015 Added by:Eduard Kovacs

A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Enterprise Security Pros Embracing Threat Intelligence, But Question Reliability: Survey

March 31, 2015 Added by:Brian Prince

While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.

Comments  (0)

6d117b57d55f63febe392e40a478011f

NIST: Internet of Things Hampered by Lack of Effective Timing Signals

March 31, 2015 Added by:Anthony M. Freed

As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Are You Prepared for Runaway Deprovisioning in Your IAM Environment? A True-Life Story…

March 31, 2015 Added by:Identropy

Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Should Infosec Professionals Hack To Understand the Mind of the Attacker?

March 31, 2015 Added by:Tripwire Inc

To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Things I Learned Talking to InfoSec People About Crime

March 30, 2015 Added by:Brent Huston

There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

How to Manage Mac and Mobile Devices in Your Existing Infrastructure

March 30, 2015 Added by:InfosecIsland News

Please join us on Tuesday, March 31 at 1PM ET for a special webcast: How to Manage Mac and mobile devices leveraging your existing infrastructure, presented by Centrify.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Swot Analysis

March 30, 2015 Added by:PCI Guru

I had someone ask me about my thoughts on this sort of analysis of the PCI DSS. While these comments are PCI focused, I found that they actually apply to all security frameworks.

Comments  (0)