Latest Blog Posts

6d117b57d55f63febe392e40a478011f

DDoS Attacks Cost Victims Average of $40,000 per Hour

June 18, 2015 Added by:Anthony M. Freed

The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

7 Development AppSec Tricks to Keep the Hackers Away – Part 1

June 17, 2015 Added by:Tripwire Inc

The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Once More on Cloud SIEM or SaaS SIEM

June 17, 2015 Added by:Anton Chuvakin

A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Need to Address the Cyber Security of Field Controllers and Sensors (Level 1 Devices)

June 17, 2015 Added by:Joe Weiss

The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

China Uses Watering Hole Attacks, JSONP Hijacking to Identify Users

June 16, 2015 Added by:Eduard Kovacs

Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

OPM Breach: Where is the Data Going?

June 16, 2015 Added by:Peter Zavlaris

The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.

Comments  (0)

Default-avatar

Fear Nothing: The Gamers Approach To Building a SOC

June 16, 2015 Added by:Seth Geftic

While it is not a silver bullet, the security teams that are most successful at defending their organizations have done so by standing up (or at least outsourcing) their own Security Operations Center (SOC).

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Once More on Insta-Fail Security Policies – Rant Alert!

June 15, 2015 Added by:Anton Chuvakin

For a while, I was under impression that my deep disdain for “insta-FAIL security policies” (i.e. those written without any chance of ever being complied with, even during the policy-writing process) knows no equal.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security 2020: What Direction is Cyberspace Heading?

June 15, 2015 Added by:Dan Lohrmann

By almost any measure, cyber danger doubled last year and hackers are now breaking into enterprise systems, stealing sensitive data and causing business disruption at an unprecedented pace.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Weak Remote Access Practices Contributed to Nearly All PoS Breaches: Trustwave

June 11, 2015 Added by:Brian Prince

It's not just hype - point-of-sale (PoS) systems are being compromised more than ever, and much of the blame falls on mistakes surrounding remote access.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Online Self-Policing: Check Yourself Before You Wreck Yourself

June 11, 2015 Added by:Lisa Huff

As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

UK Data Breaches Have Increased in Number, Scale and Cost, Reveals Study

June 11, 2015 Added by:Tripwire Inc

According to the 2015 Information Security Breaches Survey, the number of security breaches has increased in the past year, whereas the scale and cost have nearly doubled.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Several Hospira Drug Pumps Use Vulnerable Software: Researcher

June 10, 2015 Added by:Eduard Kovacs

A researcher who has analyzed the software installed on infusion pumps manufactured by Hospira says several models are plagued by the vulnerabilities disclosed earlier this year.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Forget About IOCs… Start Thinking About IOPs!

June 10, 2015 Added by:Ronnie Tokazowski

For those who may have lost track of time, it’s 2015, and phishing is still a thing. Hackers are breaking into networks, stealing millions of dollars, and the current state of the Internet is pretty grim.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Artificial Intelligence – Let’s Let Our Computers Guard Our Privacy For Us!

June 10, 2015 Added by:Brent Huston

More and more computer devices are designed to act like they are people, not machines.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »