Blog Posts Tagged with "report"

509ea0c1f4a210534eb004d35c10aa2d

The Financial Impact of Breached Protected Health Information

March 07, 2012 Added by:Marjorie Morgan

The ISA and ANSI released a new report titled The Financial Impact of Breached Protected Health Information which explores the reputational, financial, legal, operational, and clinical repercussions of a protected health information breach on an organization...

Comments  (0)

59da131e1207b6fadf8fec3862d85ad1

Cloud Security Report: The Cloud May Be Safer

March 05, 2012 Added by:alan shimel

This first installment of what promises to be a semi-annual report sheds some real light on the differences between on premises and cloud security environments, and also advances the notion that despite the FUD the cloud may in fact be safer for certain kinds of applications...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Howard Schmidt to Unveil Report on Health Information Security

March 02, 2012 Added by:Marjorie Morgan

Schmidt is slated to announce the third publication in the Internet Security Alliance's financial cyber risk management series, "The Financial Impact of Breached Protected Health Information: A Business Case for enhanced PHI Security"...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

The Truth Behind Data Breaches

February 16, 2012 Added by:Neira Jones

SQLi was the number one attack vector found in both the Web Hacking Incident Database and the number one Web-based method of entry in incident response investigations. SQL injections were the number one Web application risk of 2011...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Malnets to Become Source for Majority of Attacks

February 13, 2012 Added by:Infosec Island Admin

"Malnet infrastructures enable cybercriminals to launch dynamic attacks that are often not detected by traditional anti-virus vendors for days or months. In one case in early February 2011, a malware payload changed locations more than 1,500 times in a single day..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cyber Preparedness: Paper Tigers... Aren’t We All?

February 09, 2012 Added by:Infosec Island Admin

China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...

Comments  (0)

58bc13ef5da5ac4fc32d41c3fbc0e460

Leaking Vault Update: Records Breached Figure Passes One Billion

January 31, 2012 Added by:Suzanne Widup

Although 2007 and 2008 grew the most in terms of additional incidents being disclosed, 2008 showed the highest number of additional records, with almost 95 million. Though 2011 is not the highest in terms of incidents, it is now the leader for records disclosed thus far...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Maritime Cybersecurity Low to Non-Existent

January 24, 2012 Added by:Joel Harding

Instead of buying a ship for the relatively cheap price of $15 million, one could simply take control of the ship remotely and guide it into a target from thousand of miles away. Imagine the boom that 135 million cubic yards of natural gas could make if an LNG ship were run aground...

Comments  (12)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Analyzing the Poneman Study on Privileged Users

December 29, 2011 Added by:Rafal Los

How much access do those employees and system administrators have to your critical intellectual property, company secrets and other secret information? And how often do they take a peek behind the curtain... you know, just for curiosity?

Comments  (0)

Fe3139b2aae983885565da7757da08a8

Chrome Most Secure? Depends on Your Frame of Reference

December 21, 2011 Added by:Ed Moyle

Until recently Chrome supported SSL 2.0 by default (seems like a major no-no in my humble opinion) and the fact that Firefox is the only one of the big three to have OCSP checking enabled by default. This aspect of "browsing security" is a "score one" for Firefox in my estimation...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

ENISA Report on Maritime Cyber Security

December 20, 2011 Added by:Stefano Mele

Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Measuring Information Security Effectiveness

December 11, 2011 Added by:Bill Gerneglia

“The face of cyber threats has rapidly evolved from curious college kids taking their hand at hacking to an enormous global ecosystem of cyber-crime. Companies need a comprehensive approach to security technology, education and awareness and a very small number have truly mastered all three...”

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Malware Infection Rates – Who Has the Most Viruses?

December 07, 2011 Added by:Dan Dieterle

A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »