Latest Blog Posts


The Battle Has Moved to the Endpoints and Beyond

March 11, 2015 Added by:Peter Zavlaris

While organizations may be adding solutions to their arsenals to combat threats at the endpoint, they may want to consider what else constitutes their perimeter.

Comments  (6)


Public Sector Increasingly Targeted by Powerful DDoS Attacks

March 11, 2015 Added by:Anthony M. Freed

The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.

Comments  (11)


Seagate Downplays Risks Posed by Business NAS Flaws

March 11, 2015 Added by:Eduard Kovacs

Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.

Comments  (1)


Now That We Have All That Data What Do We Do, Revisited

March 11, 2015 Added by:Anton Chuvakin

We have SO much security data, how do we make sense of it?

Comments  (0)


Decide What Starts Automatically On Your PC

March 10, 2015 Added by:Neohapsis

The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.

Comments  (2)


Software Stockholm Syndrome

March 10, 2015 Added by:Jack Daniel

I don’t have a cure for Software Stockholm Syndrome, but as with many problems awareness is the first step to recovery.

Comments  (5)


An Audit Versus an Assessment

March 10, 2015 Added by:PCI Guru

A lot of people are always calling their PCI assessment an audit. However, certified public accountants (CPA) would tell them that there is a vast difference between the two.

Comments  (1)


GoDaddy is Just One of the Dominoes That Doesn't Have to Fall

March 10, 2015 Added by:Yair Grindlinger

Cloud security is the responsibility of the enterprise.

Comments  (0)


Cyber Insurance: Managing the Risk

March 09, 2015 Added by:Tripwire Inc

Cyber insurance is a hot topic of many debates today. It is believed to be the long-awaited cure for high-impact security risks, especially in light of constantly evolving privacy legislation and disclosure obligations – but what actually is it?

Comments  (5)


Who Validates Alerts Validated by Your Alert Validator Software?

March 09, 2015 Added by:Anton Chuvakin

Pardon the idiotic title, but some recent discussions around security analytics have made this question practically relevant.

Comments  (4)


Observations From Advisen Cyber Risk Conference March 3rd in San Francisco

March 09, 2015 Added by:Joe Weiss

The Conference was focused on data breach with heavy emphasis on recent large data breaches such as Anthem, Sony, Target, etc.

Comments  (4)


Financial Malware Fell in 2014 As Takedown Operations Have Impact

March 05, 2015 Added by:Brian Prince

One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.

Comments  (15)


Resource Scarcity Plaguing Security Programs

March 05, 2015 Added by:Anthony M. Freed

A new study reveals that two-thirds of IT leaders across a broad range of industry verticals believe they lack the resources required to support a robust security program in the face of escalating security threats.

Comments  (9)


The ‘ABC’ of the ‘APT’

March 05, 2015 Added by:Tripwire Inc

The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.

Comments  (5)


EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation

March 05, 2015 Added by:Electronic Frontier Foundation

EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).

Comments  (6)


Suits and Spooks London: Register Now for Early Bird Rate

March 04, 2015 Added by:InfosecIsland News

Suits and Spooks London 2015 will be our first 2-day international event, and is jointly produced with techUK, an association of over 850 companies that's funded by the British government.

Comments  (3)

« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »