Latest Blog Posts

E313765e3bec84b2852c1c758f7244b6

How to Avoid Getting Phished

January 14, 2015 Added by:Brent Huston

It’s much easier for an attacker to “hack a human” than “hack a machine”. This is why complicated attacks against organizations often begin with the end user.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Fear Hackers? First Invest in an IT Security Culture Change

January 14, 2015 Added by:Kevin L. Jackson

With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

British Prime Minister Wants to Ban Online Messaging Apps Including WhatsApp

January 13, 2015 Added by:Pierluigi Paganini

Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications.

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Analytics – Finally Emerging For Real?

January 13, 2015 Added by:Anton Chuvakin

Security analytics – a topic as exciting and as fuzzy as ever!

Comments  (1)

93c815429fc1ab15a9295a4f55989ae0

Operational Security - Home Rules

January 12, 2015 Added by:Neohapsis

What we tell those we advise in business also applies to friends and family; the time you spend preparing now may save you countless hours of worry and expense down the road.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Young IT Professionals, Cybercrime, Script Kiddies & CyberWarriors, OH MY!

January 12, 2015 Added by:Brent Huston

Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Should Companies Strike Back at Hackers?

January 08, 2015 Added by:Tripwire Inc

The question of whether it makes sense to attack your cyber attackers isn’t new—this has been a debate in the infosec community for quite a while. In my opinion, in most cases the answer is “No, companies shouldn’t attack back.”

Comments  (3)

Fc152e73692bc3c934d248f639d9e963

SAQ A and SAQ A-EP Clarification

January 08, 2015 Added by:PCI Guru

With the advent of SAQ A and A-EP, there seems to be confusion as to what meets what for each SAQ. I thought I covered this rather well in my post titled ‘Of Redirects And Reposts’. But apparently that was not clear enough.

Comments  (4)

65be44ae7088566069cc3bef454174a7

How to Protect Against Virulent Ransomware

January 07, 2015 Added by:Rebecca Herold

In early December, there were several reports about yet another type of ransomware, VirRansom, the next evolution of ransomware. It combines the ransomware feature of making data unavailable and locking up your computer until you pay the crooks a ransom with the feature of a virus, which allows it to spread to others.

Comments  (2)

E595c1d49bf4a26f8e14ce59812af80e

Ex-Employees: All the Best, But Can We Have Our Personal Emails Back, Please?

January 07, 2015 Added by:Patrick Oliver Graf

It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter.

Comments  (2)

6ee5846e0a227db0333ff7c99ff61313

When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Should Networked Safety Systems be Connected to Control Systems in Critical Applications

January 06, 2015 Added by:Joe Weiss

The interconnected networking of control and safety systems is making these processes much more productive, but more cyber vulnerable, and potentially less safe.

Comments  (5)

7ddc1f3000a13e4dfec28074e9e7b658

Let's Encrypt (the Entire Web): 2014 in Review

January 06, 2015 Added by:Electronic Frontier Foundation

We've been pursuing the ideas that turned into Let's Encrypt for three years, so it was a great pleasure to be able to share what we've been working on with the world.

Comments  (2)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (5)

6a71825dbf6d876764b845e0fd664e0b

Moving from Alert-Driven to Intelligence-Driven Security

January 05, 2015 Added by:Paul Lipman

The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

The Three Hop Rule

January 05, 2015 Added by:PCI Guru

At the 2014 Community Meeting, the PCI SSC responded to a question about network segmentation with what has come to be termed the “Three Hop Rule”.

Comments  (1)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »