January 19, 2011 Added by:Mike Meikle
There is a sea change taking place in information technology however. The consumerization of the enterprise by the infiltration of mass market technology has lowered the drawbridge and allowed many unauthorized devices and services to stream in and out of the corporate network...
January 18, 2011 Added by:Headlines
Instead of centralized control mechanisms such as the kill switch, the report recommends efforts be focused on the further development of strategic computer emergency response teams (CERTS) which can assess situations and affect productive measures to mitigate large scale cyber events...
January 17, 2011 Added by:Dr. Steve Belovich
There are no quick fixes to this growing problem. One thing, however, is almost certain: The growing body of lawsuits on identity theft, medical record theft, software security, safety and reliability issues will lead to federal and/or state regulation...
January 17, 2011 Added by:Headlines
The websites of some of the country's biggest universities, as well as several government administered sites, have been compromised and are redirecting visitors to SPAM ads. Sections of the websites contain redirected links to spoofed Google searches for fake online stores peddling everything from software to pharmaceuticals...
January 14, 2011 Added by:Ben Keeley
Your organization may defend against malware, may defend against password brute forcing, and possibly even be able to detect a port scan but do they defend against something as ‘good-natured’ as someone browsing the domain for open shares from a well placed sensitive server?
January 14, 2011 Added by:Danny Lieberman
Many consultants tell businesses that they must perform a detailed business process analysis and build data flow diagrams of data and business processes. This is an expensive task to execute and extremely difficult to maintain that can require large quantity of billable hours...
January 14, 2011 Added by:Headlines
"Whenever a big event occurs around the world cybercrime jumps at the chance to exploit it. And this appears to be the case with WikiLeaks and Anonymous. What an opportunity for criminals to take advantage of a volunteer army eager to take part in a struggle"...
January 13, 2011 Added by:Roman Zeltser
Many professionals have revised the entire approach to security. The common denominator for all opinions is the fact that our commonly accepted approach to IT security is not working anymore due to the new and highly sophisticated penetration tools that were developed recently...
January 13, 2011 Added by:Headlines
A classified report on military operations provided to Congress by he Pentagon failed to disclose the military's use of cyber-based operations. The Pentagon's Michael Vickers, replied by questioning whether or not cyber ops are covered by the law that dictates what should be covered in the reports...
January 13, 2011 Added by:Stefan Fouant
Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...
January 10, 2011 Added by:Headlines
The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...
January 10, 2011 Added by:Headlines
There is a clear mandate for a public-private partnership - led on the government side by DHS - but supported by all elements of the U.S. government, to include federal, state and local organizations represented here today...
January 09, 2011 Added by:Mark Gardner
Implementation of controls such as IDS / IPS / AV or non-technical controls such as screening of individuals are examples of controls that may work on implementation, but unless they are updated or re-screened over time, they do not take account of changes in circumstances...
January 08, 2011 Added by:Rafal Los
As we close out another year, and look back at all the data breaches that were enabled through the hundreds of thousands of helpfully vulnerable web applications -it's time to once again ask how we can prevent this in 2011...
January 08, 2011 Added by:Danny Lieberman
Yes – there is apparently a White House directive to keep Wikileaks documents off Federal networks – according to a directive from the White House Office of Management & Budget on the treatment of classified documents...
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013