Blog Posts Tagged with "Trend"
August 30, 2012 Added by:InfoSec Institute
"Penetration testers, the guys that come onto the sites—they’re highly in demand... In terms of technology, I think these guys see security in a different light than other people. They sort of can see it as a whole picture. Penetration testers are looking at it in a completely different light...."
August 14, 2012 Added by:Javvad Malik
To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...
May 28, 2012 Added by:Marc Quibell
Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...
April 12, 2012 Added by:Neira Jones
The Verizon DBIR 2012 was released last month and I am sure you have seen a lot on the subject. With every report, statistics and opinions have to be put in the right context. The conclusions are not surprising, but there are a few nuggets in the report worth examining...
February 20, 2012 Added by:Dave Shackleford
The “long tail” concept illustrates the subtle, often overlooked 20% market that tends to be more niche. We need those organizations that are desperate to find unusual solutions that are not available at all right now. And we need small startups to provide them...
January 26, 2012 Added by:Steven Fox, CISSP, QSA
The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...
January 26, 2012 Added by:Infosec Island Admin
Sophos unveiled its latest Security Threat Report 2012, a detailed assessment of the threat landscape—from hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for this coming year...
January 02, 2012 Added by:Bill Gerneglia
"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."
December 15, 2011 Added by:Headlines
Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...
September 30, 2011 Added by:Ken Stasiak
With Enterprise Risk Management (ERM) comes a comprehensive risk assessment equation and process. Defining one process that can be used and incorporated into the entire organization will allow for conformity, efficiency, and effective alignment between departments...
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015