Latest Blog Posts
March 13, 2014 Added by:Pierluigi Paganini
The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.
March 11, 2014 Added by:Rafal Los
Let’s face it: The industry has a ‘box problem.’ And everyone will sell you a solution to what ails you.
March 11, 2014 Added by:Michael Fimin
In order to figure out where auditing should play a part in your security strategy, let’s start by defining what should be audited as part of a security plan. To do this, look first at how security is implemented in its most simple form and work backwards to auditing’s role in your strategy.
March 10, 2014 Added by:Kevin L. Jackson
After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."
March 10, 2014 Added by:Electronic Frontier Foundation
We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications Surveillance...as a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.
March 10, 2014 Added by:Tal Be'ery
Organizations may find themselves in a “PCI’s Catch 22″ situation: Implementing PCI’s recommended Smart Card Logon for Windows may be in breach of another PCI requirement: to change passwords on a regular basis.
March 07, 2014 Added by:Anthony M. Freed
The growing cybersecurity skills and personnel gap that makes recruiting and retaining personnel with the prerequisite expertise increasingly difficult for both the public and private sectors may have reached a point where it has become “a national security crisis,” according to statements from Art Gilliland, SVP and general manager, Enterprise Security Products for HP.
March 06, 2014 Added by:Dan Dieterle
March 06, 2014 Added by:InfosecIsland News
On the heels of the Obama Administration's release of guidelines to protect the nation's essential infrastructure from cyber attacks,White House Director for Cybersecurity Critical Infrastructure Protection Samara N. Moore will headline an open discussion at the NYU Polytechnic School of Engineering about the implications for businesses in key industries.
March 06, 2014 Added by:Allan Pratt, MBA
Before any employee becomes a telecommuter, written telecommuting policies must be presented to and discussed with the employee – and then signed by the employee. Otherwise, telecommuting shouldn’t be an option.
March 05, 2014 Added by:Kevin L. Jackson
Known as the NCOIC Rapid Response Capability (NRRC™), the process defines how to build a federated cloud infrastructure that provides a foundation for information sharing within a secure environment