May 27, 2015 Added by:Peter Zavlaris
This year’s Verizon Data Breach Investigations Report (VDBIR) added a new category to its VERIS (Vocabulary for Event Recording and Incident Sharing) to track attacks with “secondary” motives.
May 27, 2015 Added by:Patrick Oliver Graf
So, should network administrators consider tapping into MSPs for network security in our current environment? The core issue is a common one in network security – convenience vs. security.
May 26, 2015 Added by:Lisa Huff
Organizations have made massive investment in a variety of security solutions over the years. It is important to understand what investments that have made in security technologies in order to understand the success and possible challenges that they face.
May 26, 2015 Added by:Anton Chuvakin
My next project, now that I am done with security analytics for now, is to revisit our cloud security monitoring work.
May 25, 2015 Added by:Tripwire Inc
For some reason, Europe’s ‘The Final Countdown’ was playing in my head as I sat and pondered this write-up. I suppose that’s fitting given that we are about to cross the 60-day mark until Windows Server 2003 goes End-of-Life.
May 25, 2015 Added by:Brent Huston
Arguably, Mutually Assured Destruction (MAD) has kept us safe from nuclear holocaust for more than half a century. Although we have been on the brink of nuclear war more than once and the Doomsday clock currently has us at three minutes ‘til midnight, nobody ever seems ready to actually push the button – and there have been some shaky fingers indeed on those buttons!
May 25, 2015 Added by:Rebecca Herold
Do you know how well your vendors, business associates, contracted third parties (who I will collectively call “contractors”) are protecting the information with which you’ve entrusted them to perform some sort of business activity? You need to know.
May 21, 2015 Added by:Tripwire Inc
During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.
May 13, 2015 Added by:Tripwire Inc
Given the evolving threat landscape, it is no surprise that the field of information security is booming. A report issued by Burning Glass Technologies reveals that job postings across the industry have grown 74 percent between 2007 and 2013—twice the rate of all other IT jobs.
May 12, 2015 Added by:Don Brooks
The latest payment card industry data security standard, a set of requirements designed to help businesses better secure their customers’ payment card information, took effect January 1, 2015, however some of the changes become mandatory at the end of next month.
May 11, 2015 Added by:Tripwire Inc
Now more than ever, it’s evident cybersecurity risk oversight at the board level is essential to keep any business or organization afloat – and off the headlines.
May 11, 2015 Added by:Brent Huston
Discovering an information security breach can be a shock! Picture it: you are enjoying a regular work day and WHAM! Suddenly you are at the center of an incident that could possibly affect the future of the company and perhaps your own future as well.
May 11, 2015 Added by:Rebecca Herold
The types of new technologies that employees are using within work environments and for business activities are going to continue to grow exponentially. Their personal data is getting more mixed with the business data on those devices. How can organizations get future ready for these increasingly high tech employees?
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015