February 03, 2015 Added by:Brian Prince
Training employees right, experts said, takes a mix of clearly-defined goals, executive support and an understanding of employees' roles and the target audience.
February 03, 2015 Added by:Joseph Pizzo
When it comes to security, be it data in motion, data in execution or data at rest, the bad guys often lurk in plain sight. They have the time and patience to wait for a distraction that allows their malicious activity to go by unseen.
February 02, 2015 Added by:Brent Huston
Given the recent spate of breaches and compromises that we have analyzed and been involved in over the last year, we have seen an emerging need for organizations to now embrace a new kind of policy – a security incident RECOVERY policy.
January 29, 2015 Added by:Jonathan Curtis
Can’t buy it, gotta earn it, as the old saying goes. With a few short searches, it is easy to find tweets that have had a significant impact on the reputation of institutions, police departments, online ecommerce properties, and corporations in 2014.
January 29, 2015 Added by:Patrick Oliver Graf
Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
January 27, 2015 Added by:Anton Chuvakin
Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.
January 27, 2015 Added by:Wendy Nather
There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis of it. There's also a lot of defensive and emotional reaction to it ("ZOMG we're going to be illegal!").
January 26, 2015 Added by:Tripwire Inc
Over the past few years, we have seen cybersecurity move from the realm of IT into the boardroom and now onto the political stage. The reason for this is clear—the resiliency, security and safety of the Internet is critical to our economy and the progress of our society as a whole. It is our future.
January 26, 2015 Added by:Dan Dieterle
You have a remote shell to a Windows box in Metasploit, very cool, but what can you do?
January 22, 2015 Added by:Patrick Oliver Graf
Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?
January 21, 2015 Added by:Brian Prince
According to a new survey of 172 IT decision makers and influencers in both enterprises and small to midsized businesses, 28 percent of organizations are not getting the most bang for their buck when it comes to their security investments.
January 15, 2015 Added by:Tripwire Inc
If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.
January 14, 2015 Added by:Kevin L. Jackson
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015