Latest Blog Posts

201d6e4b7cd0350a1a9ef6e856e28341

Are Spies or Malware in our ICS Networks - Who is Really Looking?

June 23, 2014 Added by:Joe Weiss

Are spies in our ICS networks – who really knows but we really should find out.

Comments  (0)

Default-avatar

Two Signs You Should Invest in Cloud Computing Data Security

June 23, 2014 Added by:CipherCloud

The cloud is great, and the cloud is here to stay. But to enable a successful, secure cloud deployment, you'll need to rethink your existing security strategy.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Medical Device Madness - Security Suffering

June 19, 2014 Added by:Mike Meikle

If the healthcare organization deploys an operating system patch or places their standard endpoint protection on the device, they run the risk of the vendor halting support during a device issue until the offending patch or software is removed.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On SIEM Tool and Operation Metrics

June 19, 2014 Added by:Anton Chuvakin

Measuring SIEM health and operations is still an emerging art, and there is no set of accepted SIEM metrics.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Last Chance to Register for Suits and Spooks New York

June 18, 2014 Added by:Mike Lennon

Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

What is Continuous Compliance and Assurance?

June 18, 2014 Added by:Jon Long

The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Operationalizing Cyber Requires Collaboration

June 17, 2014 Added by:InfosecIsland News

Military, government and commercial leaders will discuss national security in cyberspace at AFCEA International Cyber Symposium 2014.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Physical Security is Still a Problem

June 17, 2014 Added by:Joe Weiss

I did not think we would be able to film directly in front of large electric substations and other critical infrastructures. I was wrong.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Using “Compliant” Stuff Doesn’t Result in Full Compliance

June 16, 2014 Added by:Rebecca Herold

Organizations that access, in any way, some type of personal information will likely have data protection compliance requirements with which they must comply.

Comments  (0)

Ec47f9657c90a6db70e5e4f1cd1f7a02

The Struggle to Secure the New IT

June 16, 2014 Added by:Gretchen Hellman

Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

An Interview with Johan Hybinette

June 16, 2014 Added by:Robb Reck

Johan has served as the CISO and CTO for Schryver Medical for the past five years, and has just accepted the opportunity to join Hosting.com, located just off I-25, in the old Gates Factory.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Wide Open “Online Enabled” Physical Security Devices

June 12, 2014 Added by:Dan Dieterle

With the mad rush to make things more user friendly and convenient, security is being left aside, even in devices that are being used to protect facilities!

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »