March 05, 2015 Added by:Anthony M. Freed
A new study reveals that two-thirds of IT leaders across a broad range of industry verticals believe they lack the resources required to support a robust security program in the face of escalating security threats.
March 05, 2015 Added by:Tripwire Inc
The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.
EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation
March 05, 2015 Added by:Electronic Frontier Foundation
EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).
March 04, 2015 Added by:Tripwire Inc
Companies like mine, and consultants like me, have long been instructed and expected to pass on the mantra that the solution to security is compliance with standards and that being in compliance means you are secure. Having worked in the industry for more than a decade, I know that this is demonstrably not true.
March 03, 2015 Added by:Tripwire Inc
Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse – defined as any unapproved or malicious use of organization resources – in last year’s Verizon Data Breach Investigations Report.
February 26, 2015 Added by:Joe Weiss
I have felt that the insurance companies can be a major player in driving the need to adequately secure control systems.
February 25, 2015 Added by:Anthony M. Freed
The Federal Financial Institutions Examination Council (FFIEC) has issued revised Business Continuity Planning (BCP) guidelines for the financial services sector
February 23, 2015 Added by:PCI Guru
I have had a number of questions recently regarding how to deal with the occasional customer that sends cardholder data (CHD) or sensitive authentication data (SAD) to the merchant via email or instant messaging in blatant disregard to security.
February 23, 2015 Added by:Rebecca Herold
The costs of implementing security safeguards and privacy controls are significantly less than the costs, and damage to individuals’ lives, of cleaning up and paying all the associated money and time for security incidents and privacy breaches.
February 23, 2015 Added by:Alan Cohen
If enterprises want to counter cyberthreats, they need to both invest in APT and anti-malware technologies and improve their overall security posture.
February 19, 2015 Added by:Scott Fitzpatrick
It’s fascinating to watch the political climate being held sway with what are identified as “cyber terrorism” and “cyber war.” But it’s not the first time the Department of Defense has had to come to grips with a polemic decision that would require reengineering their entire fiscal architecture.
February 18, 2015 Added by:Joe Weiss
Just like the SCADA system affected during the 2003 Northeast Outage had known software issues, DC Metro was aware its computers and fan ventilation systems for dealing with smoke in tunnels needed to be modernized.
February 18, 2015 Added by:Robert McNutt
While no one has a crystal ball to peer in and see what 2015’s landscape will look like, one thing is for sure: hackers are becoming more sophisticated and in order to stave off data breaches, we need to be aggregating and sharing information.
February 17, 2015 Added by:Brian Prince
According to a survey of 1,000 consumers by ResearchNow, a third of the IT professionals and administrators said they had downloaded an application they were not authorized to use on a corporate device in order to do their job.
Resource Scarcity Plaguing Security Programs... Anjelina Williams on 03-06-2015
The Danger of Mixing Cyber Espionage with Cy... leijon 19 on 03-06-2015
Don’t Let Your Guard Down: Tragedies Pave ... David Peter on 03-06-2015