Network Access Control
May 21, 2015 Added by:Jonathan Curtis
This comparison is quite analogous to the differences I’ve experienced between simple threat feeds and premium threat intelligence offerings. I’ll let you draw your own conclusion as to how.
May 20, 2015 Added by:Brian Prince
The first quarter of the year set a record for the number of DDoS attacks observed across Akamai's Prolexic network, with the total number of attacks being more than double the number recorded in the first quarter of 2014.
May 19, 2015 Added by:Eduard Kovacs
A researcher who specializes in aircraft security admitted hacking into an airplane’s systems during a flight and successfully sending a climb command to one of the engines, according to an FBI search warrant application.
May 19, 2015 Added by:Anthony M. Freed
A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.
May 18, 2015 Added by:Tripwire Inc
Over the last year or so, it has become increasingly obvious that there is a uniformity related to technology failures, and more than one would be expected to encounter.
May 14, 2015 Added by:Anthony M. Freed
Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques.
May 14, 2015 Added by:Brian Prince
Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.
May 07, 2015 Added by:Brian Prince
The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.
May 06, 2015 Added by:Steve Durbin
Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.
May 06, 2015 Added by:Paul Lipman
Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.
May 06, 2015 Added by:Joe Weiss
There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015