July 14, 2014 Added by:Patrick Oliver Graf
Together, the high-profile hacking of the Houston Astros and Butler University show why it’s important for every organization to think like an enterprise in constructing a network security plan.
July 10, 2014 Added by:Mike Lennon
SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.
July 08, 2014 Added by:Joe Weiss
This is actually two blogs in one. The first is about DHS releasing critical information they weren’t even asked for. The second is about the lack of progress on addressing a subject that DHS made public.
July 07, 2014 Added by:Patrick Oliver Graf
Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.
July 07, 2014 Added by:Mike Lennon
The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.
July 03, 2014 Added by:Steve French
As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.
June 25, 2014 Added by:Anton Chuvakin
Let’s think together – what technologies and practices constitute information security essentials?
June 25, 2014 Added by:Patrick Oliver Graf
With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?
June 23, 2014 Added by:Joe Weiss
Are spies in our ICS networks – who really knows but we really should find out.
June 18, 2014 Added by:Mike Lennon
Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.
June 12, 2014 Added by:Dan Dieterle
With the mad rush to make things more user friendly and convenient, security is being left aside, even in devices that are being used to protect facilities!
Join the Security Intelligence Network on Li... Leo nardz on 10-23-2014
Q and A with Hacker "srblche srblchez"... chi nguyen on 10-23-2014
How to Log In to Windows Without the Passwor... Justiny Green on 10-23-2014