October 02, 2014 Added by:Malwarebytes
No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.
October 01, 2014 Added by:Dan Dieterle
As hardware and software manufacturers make public statements about hardening and protecting their services in the name of customer privacy, federal agencies speak out against it – let the smoke and mirrors game begin…
October 01, 2014 Added by:Rafal Los
On a recent call, one of the smartest technical folks I can name said something that made me reach for a notepad, to take the idea down for further development later. He was talking about why some of the systems enterprises believe are secure really aren't, even if they've managed to avoid some of the key issues.
September 29, 2014 Added by:Patrick Oliver Graf
When IT departments are not consulted, gaps in network security could appear.
September 24, 2014 Added by:Tripwire Inc
You may find this surprising… 18 months is a year and a half of attackers wandering around, looting sensitive data while remaining undetected.
September 23, 2014 Added by:Rebecca Herold
Most of the 250+ organizations I’ve audited, and the hundreds of others I’ve had as clients, hate documentation. At least creating documentation. So, they don’t do it, or they do it very poorly. Or, they document things they don’t need to, and fail to document the important things.
September 23, 2014 Added by:Wendy Nather
One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.
September 17, 2014 Added by:Patrick Oliver Graf
America’s largest home improvement retailer seems to have a repair for everything, but after news that its payment systems had been breached, Home Depot has a lot of work ahead to get its own house in order. It faces a long road as it repairs its reputation, its relationships with customers and its network security.
September 17, 2014 Added by:Sahba Kazerooni
When all is well, there is nothing to worry about. A poorly configured backup system, however, can make life more than a little tricky when you can’t restore your files effectively or efficiently.
September 16, 2014 Added by:Sahba Kazerooni
What’s expected from you in your role as a CISO is expanding as companies rely heavily on more complicated information systems. There is a barrage of threats and more reliance on technology as businesses leave the pencil and paper behind. Status quo is not an option with so much change occurring within the IT industry, so let’s cover one aspect that is often overlooked; an effect...
September 09, 2014 Added by:Rafal Los
Information Security leadership has and will likely continue to be part politicking, part sales, part marketing, and part security
September 04, 2014 Added by:Paul Lipman
Small and medium size businesses tend not to have the budget, resources or skills to tackle the increasingly complex security challenge on their own, and are increasingly turning to Managed Service Providers (MSPs) to protect their data, network, employees, and customers from cybercrime.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015