Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)


Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)


The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid

July 31, 2015 Added by:Joe Weiss

The recent Lloyd’s report on cyber implications of the electric grid serves an important need to understand the insurance implications of a cyber attack against the electric grid. Unfortunately, I believe the technical aspects of the hypothesized attack in the Lloyd’s study are too flawed to be used.

Comments  (0)


Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)


Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)


SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)


'Lotus Blossom' Cyber-espionage Campaign Stretches Back 3 Years: Palo Alto Networks

June 22, 2015 Added by:Brian Prince

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

Comments  (0)


Hackers Targeted the Polish Airline LOT, Grounded 1,400 Passengers

June 22, 2015 Added by:Pierluigi Paganini

The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport.

Comments  (0)


DDoS Attacks Cost Victims Average of $40,000 per Hour

June 18, 2015 Added by:Anthony M. Freed

The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.

Comments  (0)


Once More on Cloud SIEM or SaaS SIEM

June 17, 2015 Added by:Anton Chuvakin

A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.

Comments  (0)


The Need to Address the Cyber Security of Field Controllers and Sensors (Level 1 Devices)

June 17, 2015 Added by:Joe Weiss

The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.

Comments  (0)


China Uses Watering Hole Attacks, JSONP Hijacking to Identify Users

June 16, 2015 Added by:Eduard Kovacs

Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.

Comments  (0)


Weak Remote Access Practices Contributed to Nearly All PoS Breaches: Trustwave

June 11, 2015 Added by:Brian Prince

It's not just hype - point-of-sale (PoS) systems are being compromised more than ever, and much of the blame falls on mistakes surrounding remote access.

Comments  (0)


Artificial Intelligence – Let’s Let Our Computers Guard Our Privacy For Us!

June 10, 2015 Added by:Brent Huston

More and more computer devices are designed to act like they are people, not machines.

Comments  (0)


Change Controls Are Still Necessary

June 08, 2015 Added by:Rebecca Herold

Over the years in the security classes I’ve taught, I’ve covered the importance of program change control management, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.

Comments  (0)


Two's (Or More) Company: How to Use Two-Factor Authentication the Right Way

June 03, 2015 Added by:Patrick Oliver Graf

These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »