February 05, 2015 Added by:Brent Huston
The mission was simple, obtain either a file that listed more than 100 of their key suppliers, or obtain credentials and successfully logon to their internal supply system from an account that could obtain such a file.
February 04, 2015 Added by:Tripwire Inc
Security managers often find that what they put on paper is only half of the story. Getting the corporation to “cooperate” and follow the policy all the time can be far more challenging than it seems. So why do employees seem to be so reluctant?
February 04, 2015 Added by:Anton Chuvakin
So, it may seem that there is now a BUILD vs BUY choice…but is there?!
February 03, 2015 Added by:Eduard Kovacs
A survey conducted by Vanson Bourne on behalf of CA Technologies shows that senior IT and business leaders from across the world consider security a top obstacle to becoming more effective in the application economy.
February 03, 2015 Added by:Brian Prince
Training employees right, experts said, takes a mix of clearly-defined goals, executive support and an understanding of employees' roles and the target audience.
February 03, 2015 Added by:Joseph Pizzo
When it comes to security, be it data in motion, data in execution or data at rest, the bad guys often lurk in plain sight. They have the time and patience to wait for a distraction that allows their malicious activity to go by unseen.
February 02, 2015 Added by:Brent Huston
Given the recent spate of breaches and compromises that we have analyzed and been involved in over the last year, we have seen an emerging need for organizations to now embrace a new kind of policy – a security incident RECOVERY policy.
January 29, 2015 Added by:Jonathan Curtis
Can’t buy it, gotta earn it, as the old saying goes. With a few short searches, it is easy to find tweets that have had a significant impact on the reputation of institutions, police departments, online ecommerce properties, and corporations in 2014.
January 29, 2015 Added by:Patrick Oliver Graf
Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
January 27, 2015 Added by:Anton Chuvakin
Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.
January 27, 2015 Added by:Wendy Nather
There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis of it. There's also a lot of defensive and emotional reaction to it ("ZOMG we're going to be illegal!").
January 26, 2015 Added by:Tripwire Inc
Over the past few years, we have seen cybersecurity move from the realm of IT into the boardroom and now onto the political stage. The reason for this is clear—the resiliency, security and safety of the Internet is critical to our economy and the progress of our society as a whole. It is our future.
January 26, 2015 Added by:Dan Dieterle
You have a remote shell to a Windows box in Metasploit, very cool, but what can you do?
January 22, 2015 Added by:Patrick Oliver Graf
Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015