Latest Blog Posts
March 11, 2015 Added by:Anthony M. Freed
The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.
March 11, 2015 Added by:Eduard Kovacs
Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.
March 11, 2015 Added by:Anton Chuvakin
We have SO much security data, how do we make sense of it?
March 10, 2015 Added by:Neohapsis
The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.
March 10, 2015 Added by:Yair Grindlinger
Cloud security is the responsibility of the enterprise.
March 09, 2015 Added by:Tripwire Inc
Cyber insurance is a hot topic of many debates today. It is believed to be the long-awaited cure for high-impact security risks, especially in light of constantly evolving privacy legislation and disclosure obligations – but what actually is it?
March 09, 2015 Added by:Anton Chuvakin
Pardon the idiotic title, but some recent discussions around security analytics have made this question practically relevant.
March 09, 2015 Added by:Joe Weiss
The Conference was focused on data breach with heavy emphasis on recent large data breaches such as Anthem, Sony, Target, etc.
March 05, 2015 Added by:Brian Prince
One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.
March 05, 2015 Added by:Anthony M. Freed
A new study reveals that two-thirds of IT leaders across a broad range of industry verticals believe they lack the resources required to support a robust security program in the face of escalating security threats.
March 05, 2015 Added by:Tripwire Inc
The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.
EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation
March 05, 2015 Added by:Electronic Frontier Foundation
EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).
March 04, 2015 Added by:InfosecIsland News
Suits and Spooks London 2015 will be our first 2-day international event, and is jointly produced with techUK, an association of over 850 companies that's funded by the British government.