March 31, 2015 Added by:Anthony M. Freed
As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.
March 31, 2015 Added by:Identropy
Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment
March 31, 2015 Added by:Tripwire Inc
To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.
March 30, 2015 Added by:Brent Huston
There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.
The Government Says It Has a Policy on Disclosing Zero-Days, But Where Are the Documents to Prove It?
March 30, 2015 Added by:Electronic Frontier Foundation
Despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.
March 26, 2015 Added by:Joseph Pizzo
With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.
Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security
March 26, 2015 Added by:Kevin Watson
The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.
March 25, 2015 Added by:Anthony M. Freed
The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.
March 23, 2015 Added by:PCI Guru
For years organizations have complained that they receive varying advice from different QSAs even when the QSAs are from the same firm...To address this situation, the Council is telling all PCI stakeholders that it is up to the organizations being assessed to define the rules of the assessment.
March 23, 2015 Added by:Peter Zavlaris
Premera Blue Cross is the latest victim of what appears to be a long-term APT perpetrated by China. Between CHS, Anthem and now Premera Blue Cross, it’s now safe to say health insurance is firmly in the cross hairs of powerful nation state actors.
March 19, 2015 Added by:Steve Durbin
The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.
March 19, 2015 Added by:Stefano Mele
The Ponemon Institute has published the "2015 Global Megatrends in Cybersecurity". Sponsored by Raytheon Company, the aim of this research is to understand the big trends or changes that will impact the security posture of organizations in both the public and private sector in the next three years.
March 19, 2015 Added by:Brian Prince
According to a survey conducted as part of Trustwave's '2015 Security Pressures Report', 54 percent of the more than 1,000 IT professionals surveyed said they experienced more pressure to secure their network in 2014 than they did in 2013. Fifty-seven percent said they expect this year to be even worse. Just 11 percent expect the amount of pressure they face to decline.
March 18, 2015 Added by:Anthony M. Freed
The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015