Latest Blog Posts
June 24, 2015 Added by:Peter Zavlaris
New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.
June 23, 2015 Added by:Anthony M. Freed
Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.
June 22, 2015 Added by:Idan Aharoni
Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.
June 22, 2015 Added by:Steve Durbin
Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.
June 22, 2015 Added by:Brian Prince
Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.
June 22, 2015 Added by:Tripwire Inc
Application security starts from the foundation – the source code.
June 22, 2015 Added by:Pierluigi Paganini
The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport.
June 18, 2015 Added by:Eduard Kovacs
The use of static keys and other encryption issues expose numerous organizations that rely on SAP products to malicious hacker attacks, researchers have warned.
June 18, 2015 Added by:Malwarebytes
More often than not, the sad truth is that if you’re worrying after the creation stage, you’ve probably left it too late and those juicy secrets are going to escape. Deploying a healthy dose of caution before setting digital pen to paper is always going to pay off.
June 18, 2015 Added by:Anthony M. Freed
The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.
June 17, 2015 Added by:Tripwire Inc
The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.
June 17, 2015 Added by:Anton Chuvakin
A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.
June 17, 2015 Added by:Joe Weiss
The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.
June 16, 2015 Added by:Eduard Kovacs
Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.