Latest Blog Posts
January 21, 2015 Added by:Tripwire Inc
As we go about our daily lives, we are leaving subliminal digital traces behind us from our logical footprint.
January 20, 2015 Added by:Alan Cohen
Why the American government must play an essential role in catalyzing a national response to the emerging cyber crisis, business and private citizens can also take a leading role in safeguarding our data and preserving both our way of life and our commercial base. Here are 4 areas worth considering in the context of business.
January 20, 2015 Added by:Joe Weiss
The North American Electric Corporation (NERC) Critical Infrastructure Protection (CIP) cyber security standards were developed to increase the cyber security and reliability of the electric grid. Unfortunately, they are not doing either.
January 20, 2015 Added by:Amit Serper
If we didn’t already get the memo in 2014, the Sony hack serves as a harsh reminder of how easy it is for attackers to hide undetected, inside a network for long periods of time.
January 19, 2015 Added by:Brent Huston
It would be nice to be able to say that we are winning the war; that network security efforts are slowly getting the better of the bad guys. But I can’t do that.
January 19, 2015 Added by:Carson Sweet
Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.
January 19, 2015 Added by:Patrick Oliver Graf
One month ago, we asked, “What network security lessons can we learn from the Sony attack?” Since then, new information has been slow to trickle out, save for the FBI’s mid-December statement that assigned responsibility to the North Korean government.
January 15, 2015 Added by:Electronic Frontier Foundation
Verizon advertising partner Turn has been caught using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them with dozens of major websites and ad networks, forming a vast web of non-consensual online tracking.
January 15, 2015 Added by:Tripwire Inc
If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.
January 14, 2015 Added by:Kevin L. Jackson
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.
January 13, 2015 Added by:Pierluigi Paganini
Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications.