Latest Blog Posts
January 14, 2015 Added by:Kevin L. Jackson
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.
January 13, 2015 Added by:Pierluigi Paganini
Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications.
January 12, 2015 Added by:Brent Huston
Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.
January 08, 2015 Added by:Tripwire Inc
The question of whether it makes sense to attack your cyber attackers isn’t new—this has been a debate in the infosec community for quite a while. In my opinion, in most cases the answer is “No, companies shouldn’t attack back.”
January 08, 2015 Added by:PCI Guru
With the advent of SAQ A and A-EP, there seems to be confusion as to what meets what for each SAQ. I thought I covered this rather well in my post titled ‘Of Redirects And Reposts’. But apparently that was not clear enough.
January 07, 2015 Added by:Rebecca Herold
In early December, there were several reports about yet another type of ransomware, VirRansom, the next evolution of ransomware. It combines the ransomware feature of making data unavailable and locking up your computer until you pay the crooks a ransom with the feature of a virus, which allows it to spread to others.
January 07, 2015 Added by:Patrick Oliver Graf
It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter.
January 07, 2015 Added by:Michael Leland
Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.
January 06, 2015 Added by:Joe Weiss
The interconnected networking of control and safety systems is making these processes much more productive, but more cyber vulnerable, and potentially less safe.
January 05, 2015 Added by:Thu Pham
Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.
January 05, 2015 Added by:Paul Lipman
The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.