July 02, 2014 Added by:Joe Weiss
The past two weeks continue to demonstrate the lack of understanding about the unique issues of ICS cyber security – why isn’t it just IT.
June 30, 2014 Added by:Rebecca Herold
The power of big data analytics is so great that in addition to all the positive business possibilities, there are just as many new privacy concerns being created. Here are ten of the most significant privacy risks.
June 19, 2014 Added by:Mike Meikle
If the healthcare organization deploys an operating system patch or places their standard endpoint protection on the device, they run the risk of the vendor halting support during a device issue until the offending patch or software is removed.
June 18, 2014 Added by:Jon Long
The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.
June 16, 2014 Added by:Rebecca Herold
Organizations that access, in any way, some type of personal information will likely have data protection compliance requirements with which they must comply.
June 11, 2014 Added by:Joe Weiss
The story is that MANY ICSs are connected to the Internet and it isn’t expensive to find them.
June 04, 2014 Added by:Joe Weiss
When people complain that operators are too focused on safety and reliability I don’t know whether to laugh or cry.
June 04, 2014 Added by:Stefano Mele
The U.S. Government Accountability Office (GAO) found that twenty-four major federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a security breach of a computerized system and information).
May 20, 2014 Added by:Nima Dezhkam
As a main area of our interest, PCI v3.0 enhances the Penetration Testing requirement by adding guidelines that help both the organizations and the auditors to better show and understand two important areas of concern in every PCI compliance effort.
May 01, 2014 Added by:Tripwire Inc
SARA (the Situational Awareness Reference Architecture) provides applicable steps for creating local and shared situational awareness.
How Businesses Can Reduce Wearables Security... manthan rathod on 04-09-2015
Lessons From Hillary Clinton's Email Securit... manthan rathod on 04-09-2015
New Facebook Worm Variant Leverages Multiple... manthan rathod on 04-09-2015