March 17, 2015 Added by:Joe Weiss
There is still a significant gap in understanding of industrial control system (ICS) cyber security by many in the insurance industry.
March 16, 2015 Added by:Anthony M. Freed
The 2015 Global Megatrends in Cybersecurity (PDF) report – which surveyed 1,006 chief information officers, chief information security officers (CISOs) and senior IT leaders – reveals that threat intelligence-based solution will be among the key technologies employed in enterprise networks in the next three years.
March 16, 2015 Added by:Rebecca Herold
Have you established information security and privacy policies for the use of wearable computing devices within your organization? No? Well, what are you waiting for?
March 16, 2015 Added by:Peter Zavlaris
Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.
March 12, 2015 Added by:Tripwire Inc
Technologies are advancing rapidly, and there is good reason to always be learning new tech skills but if you strip away the revolving technologies from what you do, there you are. Infosec skills are essential, but so are YOU!
March 11, 2015 Added by:Anton Chuvakin
We have SO much security data, how do we make sense of it?
March 10, 2015 Added by:Yair Grindlinger
Cloud security is the responsibility of the enterprise.
March 09, 2015 Added by:Tripwire Inc
Cyber insurance is a hot topic of many debates today. It is believed to be the long-awaited cure for high-impact security risks, especially in light of constantly evolving privacy legislation and disclosure obligations – but what actually is it?
March 09, 2015 Added by:Joe Weiss
The Conference was focused on data breach with heavy emphasis on recent large data breaches such as Anthem, Sony, Target, etc.
March 05, 2015 Added by:Anthony M. Freed
A new study reveals that two-thirds of IT leaders across a broad range of industry verticals believe they lack the resources required to support a robust security program in the face of escalating security threats.
March 05, 2015 Added by:Tripwire Inc
The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.
EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation
March 05, 2015 Added by:Electronic Frontier Foundation
EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).
March 04, 2015 Added by:Tripwire Inc
Companies like mine, and consultants like me, have long been instructed and expected to pass on the mantra that the solution to security is compliance with standards and that being in compliance means you are secure. Having worked in the industry for more than a decade, I know that this is demonstrably not true.
March 03, 2015 Added by:Tripwire Inc
Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse – defined as any unapproved or malicious use of organization resources – in last year’s Verizon Data Breach Investigations Report.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015