Latest Blog Posts
October 22, 2013 Added by:Vince Schiavone
As the “social age,” “mobile age” and “consumer age” converge, enterprise risk is experiencing a evolutionary shift due to the array of complex emerging threats that are challenging corporations on various levels. With billions upon billions of daily social discussions from consumers, influencers, competitors, activists, journalists and regulators, an entirely new social dimension of r...
October 20, 2013 Added by:Matthijs R. Koot
On October 15th, the Dutch cabinet responded (.pdf, in Dutch) to Parliamentary questions concerning planned AMS-IX expansion to U.S. in the light of U.S. spying. The response is only available in Dutch; here is my English translation. Hyperlinks are mine.
October 17, 2013 Added by:Rohit Sethi
Addressing security requirements while building software is substantially faster than fixing security vulnerabilities later, and since so many organizations end up mandating fixing security defects, preventing those defects up-front yields faster time-to-market.
October 16, 2013 Added by:Infosec Island
Please join Trend Micro and SecurityWeek on Thursday, Oct. 17th at 5pm at Del Frisco's in Boston for an interactive security event with great food and open bar!
October 16, 2013 Added by:Hani Banayoti
Consider encryption at rest but make informed decisions about its value and protection afforded.
October 16, 2013 Added by:Patrick Oliver Graf
It seems barely more than a few weeks can pass without news of a major global company being targeted by cyber criminals. The latest to find a bullseye on its back is Adobe. The software company — which is responsible for some of the most widely used photo, video and graphic editing software in the world — announced that the private information of some 3 million customers had been pilfered by h...
October 15, 2013 Added by:Patrick Oliver Graf
Many Interop vendors and experts agree that enterprises are relying on third-party service providers more than ever before. Businesses are acknowledging the growing prominence of trends including BYOD and the cloud, and are trying to be more flexible in terms of what applications, operating systems and devices they are supporting.
October 15, 2013 Added by:Robb Reck
The implementation of a risk management focused information security program not only increases the security of the organization, it increases the collaboration between security and other technical stakeholders, frees up security to do what it does best (instead of making business decisions) and improves the organization’s risk awareness.
In Snowden’s Wake, Will Advanced Surveillance Attack (ASA) Become Next APT? John McAfee Kicks-Off Anti-NSA Trend
October 11, 2013 Added by:Joe Franscella
Just a few months back you might have thought that Mandiant had etched the trend and term Advanced Persistent Threat (APT) in the top position on the cybersecurity wall of fame — that may not end up being the case.
October 10, 2013 Added by:Michelle Drolet
Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing.
October 09, 2013 Added by:Kyle Adams
Browsers have become extremely complex over the last few years, so does everyone fully understand everything a modern browser does? Of course everyone is familiar with the point and click, redirections, forms . . . normal Web stuff. What you might not know, is that your browser does a lot of things automatically without you asking it to.
October 08, 2013 Added by:Electronic Frontier Foundation
The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.
October 08, 2013 Added by:InfosecIsland News
Please join Trend Micro and SecurityWeek this Thursday (Oct. 10) in Minneapolis orAtlanta for a security seminar along with with food and open bar!
What Manufacturers Should Do to Build Secure Devices: Integrating Security into the Product Development Life Cycle
October 07, 2013 Added by:Matt Neely
Recently the security of network-enabled medical devices has earned a lot more attention as a result of new FDA draft guidance.
October 06, 2013 Added by:Allan Pratt, MBA
Apple’s new operating system known as iOS7 comes with a clever feature called “AirDrop.” This much-anticipated feature is similar to the NFC (near field communications) technology that can be found on most Android phones. But the difference between AirDrop and Android’s NFC technology is that AirDrop can be used at a greater distance than its competitors.