Latest Blog Posts


Tomorrow’s Forecast: Increasing Clouds. Extending Your Secure Identity Environment into the Cloud

April 07, 2015 Added by:Identropy

As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment. On the bright side, these organizations have a very strong security foundation in place for internally hosted applications.

Comments  (0)


Security Reviews Critical to Cloud Migration

April 07, 2015 Added by:Brian Prince

Organizations appear to be getting better at understanding the security implications of moving to the cloud through their review processes, according to a new report.

Comments  (0)


Long Live the Botnet

April 07, 2015 Added by:Or Katz

You might think that being exposed in a security blog post might bring shame to a bot, and that at the very least it might spend some time underground.

Comments  (0)


One-in-Six Advocate Prison for CEOs and Board Members After Breaches

April 06, 2015 Added by:Anthony M. Freed

In a recent survey of security professionals conducted at the e-Crime Congress, 16% of respondents said they support laws that would result prison sentences for executives and Boards of Directors for any negligence on their part following a major data breach.

Comments  (0)


Cybercrime Is Now More Profitable Than The Drug Trade

April 06, 2015 Added by:Tripwire Inc

As reported by the 2013 Europol Serious & Organized Threat Assessment, the “Total Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.”

Comments  (0)


PCI Issues Penetration Testing Information Supplement

April 06, 2015 Added by:PCI Guru

Not surprisingly, I have a number of comments based on what I have read. There are some good things that have come out of this effort. But in my opinion, the committee missed the boat in a few areas and those will lead to even more confusion between penetration testers, QSAs and clients.

Comments  (0)


Rethinking the Cyber Kill Chain

April 02, 2015 Added by:Invincea

While the underlying framework and conclusions are excellent, there are few entities capable of fully implementing defenses against all aspects of the cyber kill chain for multiple reasons

Comments  (0)


ICS Cyber Incidents – What Relevant Information Actually Exists?

April 02, 2015 Added by:Joe Weiss

There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.

Comments  (0)


China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack

April 02, 2015 Added by:Electronic Frontier Foundation

Over the past few weeks, China has been using its country's Internet infrastructure to attack political opponents by turning normal users' web browsers into Denial of Service tools.

Comments  (0)


The Dark Side of “You Will” in the Internet of Things

April 02, 2015 Added by:Christopher Budd

Back in the early 1990s, AT&T capitalized on this with their “You Will” campaign, which outlined some of the things they said “you will” be able to do in the future. The bright future of technology is intriguing and exciting, but we must first take responsibility for our security and privacy as to avoid any downfalls.

Comments  (0)


30 Percent of Companies Would Negotiate Data Ransom With Cybercriminals

April 01, 2015 Added by:Brian Prince

Negotiating with criminals is risky, but it is apparently a risk some people are willing to take if it is going to get them their data back.

Comments  (0)


Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)


mDNS Can Be Used to Amplify DDoS Attacks: Researcher

April 01, 2015 Added by:Eduard Kovacs

A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.

Comments  (0)


Enterprise Security Pros Embracing Threat Intelligence, But Question Reliability: Survey

March 31, 2015 Added by:Brian Prince

While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.

Comments  (0)


NIST: Internet of Things Hampered by Lack of Effective Timing Signals

March 31, 2015 Added by:Anthony M. Freed

As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.

Comments  (0)


Are You Prepared for Runaway Deprovisioning in Your IAM Environment? A True-Life Story…

March 31, 2015 Added by:Identropy

Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment

Comments  (0)

« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »