Latest Blog Posts
July 07, 2014 Added by:Mike Lennon
The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.
July 03, 2014 Added by:PCI Guru
All of you service providers out there that have remote access to your customers managed by some enterprise credential management solution, please implement a strong two-factor authentication solution on your customer credential management solution before you too become a newspaper headline.
July 03, 2014 Added by:Steve French
As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.
July 02, 2014 Added by:Joe Weiss
The past two weeks continue to demonstrate the lack of understanding about the unique issues of ICS cyber security – why isn’t it just IT.
July 01, 2014 Added by:Anthony M. Freed
With the August 5th & 6th show fast approaching, we are continuing our series highlighting some of the coolest presentations that are scheduled to take place at Security BSides Las Vegas.
June 30, 2014 Added by:Rafal Los
The topic of software security, or AppSec, has once again cropped up recently in my travels and conversations so I thought it would be prudent to address that here on the blog.
June 30, 2014 Added by:Rebecca Herold
The power of big data analytics is so great that in addition to all the positive business possibilities, there are just as many new privacy concerns being created. Here are ten of the most significant privacy risks.
June 28, 2014 Added by:Jeffrey Carr
If you're a cyber security startup, chances are good that you may have a product or service of interest to the U.S. government but do you know the complexities that come with that? If you attend our Security Startup Lunch in DC on July 22, you can ask Hendrik van der Mueler, Barbara Hunt, and Lewis Shepherd for their advice.
June 25, 2014 Added by:Anton Chuvakin
Let’s think together – what technologies and practices constitute information security essentials?
June 25, 2014 Added by:Patrick Oliver Graf
With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?