Latest Blog Posts
April 02, 2015 Added by:Christopher Budd
Back in the early 1990s, AT&T capitalized on this with their “You Will” campaign, which outlined some of the things they said “you will” be able to do in the future. The bright future of technology is intriguing and exciting, but we must first take responsibility for our security and privacy as to avoid any downfalls.
April 01, 2015 Added by:Brian Prince
Negotiating with criminals is risky, but it is apparently a risk some people are willing to take if it is going to get them their data back.
April 01, 2015 Added by:Malwarebytes
WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.
April 01, 2015 Added by:Eduard Kovacs
A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.
March 31, 2015 Added by:Brian Prince
While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.
March 31, 2015 Added by:Anthony M. Freed
As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.
March 31, 2015 Added by:Identropy
Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment
March 31, 2015 Added by:Tripwire Inc
To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.
March 30, 2015 Added by:Brent Huston
There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.
March 30, 2015 Added by:InfosecIsland News
Please join us on Tuesday, March 31 at 1PM ET for a special webcast: How to Manage Mac and mobile devices leveraging your existing infrastructure, presented by Centrify.
The Government Says It Has a Policy on Disclosing Zero-Days, But Where Are the Documents to Prove It?
March 30, 2015 Added by:Electronic Frontier Foundation
Despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.
March 30, 2015 Added by:Patrick Oliver Graf
The South by Southwest (SXSW) Interactive Festival wrapped up last week in Austin, Texas, where 65,000 industry movers and shakers learned about some of the most innovative technology expected to hit the market over the next few years. What was on the minds of presenters, panelists, and attendees alike? “The Future” – all of its possibilities and its promise.
March 26, 2015 Added by:Joseph Pizzo
With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.
Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security
March 26, 2015 Added by:Kevin Watson
The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.
March 26, 2015 Added by:Brian Prince
A new report from Akamai Technologies names China as the top source of attack traffic on the Web.