Latest Blog Posts


Citigroup Executive Pleads Guilty to Insider Theft of Millions

September 07, 2011 Added by:Headlines

“Foster exploited his position as a trusted insider to embezzle tens of millions of dollars and to conceal the theft for as long as possible. The FBI is determined to uncover bank larceny in any form,” said FBI Assistant Director in Charge Fedarcyk...

Comments  (0)


Promoting Security Policies Using Organizational Culture

September 06, 2011 Added by:Steven Fox, CISSP, QSA

Optimal utilization of security policies relies on the audience for which they are created. Policy creation and marketing must recognize and capitalize on organizational culture to promote its value proposition. People can be the strongest link in the security chain...

Comments  (0)


Forensics for Network, Internet, and Cloud Computing

September 06, 2011 Added by:Tony Campbell

A number of chapters had a very long and complete reference section, while a few chapters had no reference section at all, yet it was obvious that they required a reference section. And poor screenshots and lack of references seems like laziness on behalf of the author and publisher...

Comments  (0)


IT Skills and Certifications Paying Less Each Quarter

September 06, 2011 Added by:Bill Gerneglia

The pay premiums for 237 IT certifications continued their terrible performance for a fourth second straight quarter. This trend results in an overall loss in market value of nearly 2 percent for the quarter, according to the Foote Partners report...

Comments  (0)


Preliminary Report on Bogus DigiNotar Certificates

September 06, 2011 Added by:Headlines

"A number of servers were compromised. The hackers have obtained administrative rights to the outside webservers, the CA server Relaties-CA and also to Public-CA. Traces of hacker activity started on June 17th and ended on July 22nd..."

Comments  (0)


China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)


DHS Issues Security Bulletin on Anonymous Hackers

September 06, 2011 Added by:Headlines

"These attacks have the potential to result in serious harm, particularly to Law Enforcement... Also, this assessment does not take into account the possibility of a higher-level actor providing Anonymous, LulzSec or a similar group with more advanced capabilities..."

Comments  (0)


The Top Three Hacker Movies Of All Time...

September 06, 2011 Added by:Lee Munson

The movies that hackers love to watch: These movies show the genre in an enlightening way and anyone who makes a living slanging code on the computer can relate to them. Some are classics because of how realistic they are while others are classics because of the cheesy value...

Comments  (0)


Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)


Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)


California's "Sextortion" Hacker Sentenced to Prison

September 06, 2011 Added by:Headlines

In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”

Comments  (0)


Information Security as the Doctor of the Enterprise

September 05, 2011 Added by:Robb Reck

Aren’t we in information security playing exactly the same role in our organizations that our doctor’s play in our healthcare? We evaluate, diagnose, and treat our patients, just like our doctors do for us. But our evaluations are called risk assessments instead of checkups...

Comments  (1)


Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)


How to Engage Employees in Compliance

September 05, 2011 Added by:Thomas Fox

A compliance professional should see him or herself as a catalyst for problem solving. As a lawyer I understand that you are required to know law and compliance requirements. But remember - it is OK not to know everything. That is the whole point of collaboration...

Comments  (0)


The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)


On Car Hacking Attacks

September 04, 2011 Added by:Theresa Payton

There is nothing like a nice sunny day driving around town in your car, listening to your favorite music. But did you know that depending upon how you get your music, you might make your home computer vulnerable to hackers and also your car?

Comments  (2)

« First < Previous | 292 - 293 - 294 - 295 - 296 | Next > Last »