May 06, 2015 Added by:Steve Durbin
Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.
May 06, 2015 Added by:Paul Lipman
Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.
May 05, 2015 Added by:Anthony M. Freed
The newly released Internet Security Threat Report (ISTR) – which examines emerging trends in attacks, malicious code activity, phishing, and spam – reveals that 2014 was a record-setting year for the exploitation of zero-day vulnerabilities, and it took software companies an average of 59 days to implement patches, up from only four days in 2013.
May 04, 2015 Added by:Tripwire Inc
Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get used to it.
April 28, 2015 Added by:Peter Zavlaris
The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.
April 28, 2015 Added by:Patrick Oliver Graf
Users want, and demand, access to a broad range of personal mobile devices in the workplace. They want to be able to safely access work files on their phones while on-the-go and work from their homes on their personal laptops.
April 27, 2015 Added by:Brent Huston
Risk assessment and treatment is something we all do, consciously or unconsciously, every day.
April 21, 2015 Added by:Peter Zavlaris
The number of security breaches that have occurred over the last year and a half is unprecedented and has demonstrated a requirement for stronger security. The improvements needed to be made from within will stem from the CISO’s desk. This represents a shift that will require enterprises to re-examine the role of the CISO.
April 19, 2015 Added by:Brent Huston
Spring is here in the US, and that brings with it the need to do some spring cleaning. So, here are some ideas of some things I would like to see the infosec community clean out with the fresh spring air!
April 15, 2015 Added by:Brian Prince
In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.
April 14, 2015 Added by:Anthony M. Freed
The Federal Financial Institutions Examination Council (FFIEC) released two documents with guidance for financial institutions on mitigating risks from the increase in cyber attacks that compromise user credentials or employ destructive software.
April 14, 2015 Added by:Kevin L. Jackson
The best skill set for preparing someone to become a CISO is a statistical tie between business knowledge and knowledge of IT security best practices.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015