Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Defense Research Lab Back Online After Attacks

July 18, 2011 Added by:Headlines

Nearly two weeks after an Advanced Persistent Threat (APT) attack caused officials to take systems offline at the Energy Department’s Pacific Northwest National Laboratory (PNNL), nearly all systems have been restored to normal operating parameters...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Seven Security Blankets and I'm Still Short-Sheeted

July 17, 2011 Added by:Kevin McAleavey

Client-side "layered security" is a mess. It fails because people are so irritated by all the alerts that they don't understand. They no longer trust their security arrangements, and when they visit a site that offers a rogue antivirus and no alert pops up, they let it run for a second opinion...

Comments  (0)

E973b16363b3de77b360563237df7e32

Software Security Degree Programs

July 17, 2011 Added by:Bozidar Spirovski

More institutions are providing programs and degrees focused on the security aspect of information technology than ever before. Part of the reason for this is the significant projected increase in the number of jobs available in the field...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Cyber Criminals Just Came A Callin’ At My House

July 17, 2011 Added by:Rebecca Herold

When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”

Comments  (21)

37d5f81e2277051bc17116221040d51c

Judge Says Its OK to Post Social Security Numbers

July 16, 2011 Added by:Robert Siciliano

Over the years, many have interpreted the to allow Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Why Perform FCPA Due Diligence?

July 15, 2011 Added by:Thomas Fox

Once again, the need for continued vigilance throughout the due diligence process. Simply because your agent/vendor/business relationship is located in the United States, does not mean that you can automatically limit your due diligence inquiry to a Level One search...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

69dafe8b58066478aea48f3d0f384820

Senators Inquire About Gov Mobile Phone Tracking

July 15, 2011 Added by:Headlines

Senators Ron Wyden and Mark Udall have drafted a letter addressed to Director of National Intelligence James Clapper with a simple, straight forward question: “Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?”

Comments  (2)

7c5c876d1933023ac375eead04302e1a

Hey ISC2 - Where is the Opt Out Button?

July 15, 2011 Added by:Boris Sverdlik

I am a security researcher, and my presentation at Security Bsides was written in the same form that most “pen testing” classes are. If you are naïve enough to believe that criminals don’t use security tools in their efforts, then my friend it is finally time to hang up that hat...

Comments  (0)

E973b16363b3de77b360563237df7e32

The Cloud - Time for Some Serious Consideration

July 15, 2011 Added by:Bozidar Spirovski

The cloud is very ripe for web services. But before you choose one, be careful to do a serious consideration on your pros and cons. If you can match your application/site to a cloud service, you can bring it to a new level of efficient operation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Organized Criminal Groups Targeted by DOJ and Romanians

July 15, 2011 Added by:Headlines

An ongoing Internet fraud scheme conducted by several networks of organized cyber criminals in Romania and the United States has been disrupted as a result of a series of law enforcement actions coordinated since 2010 between Romanian and U.S. law enforcement, including numerous arrests...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Best And Most Secure Windows OS Ever

July 14, 2011 Added by:Kevin McAleavey

When it comes to the number one "moment of abject stupidity" that award has to go to "browser/OS integration" with the release of Windows98. There was much outcry including my own testimony at an FTC hearing, and at the end of my testimony, I warned the FTC what was to come from this...

Comments  (5)

9f19bdb2d175ba86949c352b0cb85572

Risk Management and Compliance Part Two

July 14, 2011 Added by:Neira Jones

Being prepared remains the best defense against security breaches. As we have seen, organizations still remain slow in detecting and responding to incidents. Nearly two-thirds of breaches continue to be uncovered by external parties and then only after a considerable amount of time...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

We Are Infosec Professionals - Who the Hell Are You?

July 14, 2011 Added by:Javvad Malik

I explained to someone that I worked in infosec, they commented, “there’s not much you guys do given all the hacking that’s gone on lately.” I could have just explained how a lot of the so-called hacking attacks were actually DDOS, or that human error was responsible, but my mind wandered...

Comments  (11)

F29746c6cb299c1755e4087e6126a816

How to Inform Customers of a Data Breach

July 14, 2011 Added by:Kelly Colgan

The news is bad: Your company suffered a data breach. Don’t make it worse by sending out a confusing, overly technical or outright alarming letter to your customers. The goal is to inform, educate and reassure your customers, not bore or scare them...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »