Latest Blog Posts

179bc88eff504b5632ac8fbd9ee7b09d

Six Things to Know About Computer Theft

March 15, 2016 Added by:Eyal Bek

Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

March Madness Apps May Create BYOD Risk for Enterprises

March 14, 2016 Added by:InfosecIsland News

Unbeknownst to Employees, the Behaviors and Functions of Widely Used March Madness Sport and Media Apps May Violate Corporate BYOD Risk Policies

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Web Application Firewall: a Must-Have Security Control or an Outdated Technology?

March 09, 2016 Added by:Ilia Kolochenko

Being insufficient to properly mitigate complicated security flaws in modern web applications, a Web Application Firewall still remains a necessary security control within organizations. 

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Diffie and Hellman Receive ACM A.M. Turing Award

March 08, 2016 Added by:InfosecIsland News

The Association for Computing Machinery (ACM) has announced that cryptography pioneers Whitfield Diffie and Martin Hellman won this year’s A.M. Turing Award.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Exploit Kits, Android Malware Dominated 2015: Dell

February 22, 2016 Added by:InfosecIsland News

Dell has released its Dell Security Annual Threat Report 2016, revealing that key trends defining the threat landscape, ranging from new, aggressive tactics employed by adversaries to a massive increase in malware attacks in 2015.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Rallies Planned at Apple Stores to Protest FBI's Backdoor Court Order

February 17, 2016 Added by:InfosecIsland News

Rallies planned at Apple stores nationwide to protest court order pressuring the company to build a “backdoor” for the FBI to hack the iPhone

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Denying the Deniers: Tackling DDoS Attacks

February 17, 2016 Added by:Avishai Wool

As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Five Rules to Conduct a Successful Cybersecurity RFP

February 16, 2016 Added by:Ilia Kolochenko

It becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear, Uncertainty, Doubt) tactics. This makes the process of cybersecurity RFP (Request For Proposal) more complicated and challenging for organizations of all sizes.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Afaria: How to Wipe Mobile Devices Clean with One Text Message

February 11, 2016 Added by:Alexander Polyakov

SAP Afaria can be used for remote control of mobile devices and, with ClientID generated on the basis of IMEI, attackers can compromise devices via text messages if they know the victim's phone number and IMEI.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes February 2016 - Review

February 10, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for February 2016, which closes 23 vulnerabilities in SAP products.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Five Security Threats Businesses Should Prepare for in 2016

January 28, 2016 Added by:Steve Durbin

After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Top Five Enterprise Data Privacy Mistakes

January 28, 2016 Added by:InfosecIsland News

The European General Data Protection Regulation is a new privacy regulation with fines as high as four percent of annual global revenue for companies that fail to safeguard data of EU citizens and residents. In the U.S. 16 states recently introduced new, ACLU supported data privacy legislation. In spite of efforts to improve privacy protections many enterprises are not doing enough to protect cons...

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »