April 12, 2016 Added by:Amir Geri
The vulnerabilities found in Flash Player have forced Adobe to issue out security patches yet again. Whether the decision is to uninstall Flash entirely or ensure that all updates have been completed across the enterprise, the issue IT practitioners face is related to compliance.
April 05, 2016 Added by:Steve Durbin
Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.
April 05, 2016 Added by:Michael Machado
The more questions you ask, the more you, as a customer, will have the information you need to determine if a cloud vendor is ready to be your partner in the shared security model that cloud computing requires. Here are five to start with for your Unified Communications as a Service (UCaaS) vendor.
April 01, 2016 Added by:Paul Morville
This April Fool’s Day, let’s acknowledge that a security strategy focused exclusively on patching and prevention is a fool’s errand and let’s move towards an adaptive approach that includes prevention, detection, continuous visibility and response.
March 24, 2016 Added by:Robert Grapes
As we become more connected through wearables, mobile devices, IoT devices in our homes, security cameras, health trackers, and online bank accounts, we become exponentially more vulnerable to criminal attacks and government intrusion. Civil liberties, anonymity, personal safety, home security, children safety—all is at risk.
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
February 22, 2016 Added by:InfosecIsland News
Dell has released its Dell Security Annual Threat Report 2016, revealing that key trends defining the threat landscape, ranging from new, aggressive tactics employed by adversaries to a massive increase in malware attacks in 2015.
February 22, 2016 Added by:Larry Karisny
When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
February 17, 2016 Added by:Avishai Wool
As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.
February 16, 2016 Added by:Ilia Kolochenko
It becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear, Uncertainty, Doubt) tactics. This makes the process of cybersecurity RFP (Request For Proposal) more complicated and challenging for organizations of all sizes.
January 28, 2016 Added by:Steve Durbin
After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...
January 15, 2016 Added by:Luis Corrons
The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.
January 13, 2016 Added by:InfosecIsland News
Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015