Blog Posts Tagged with "report"
March 07, 2012 Added by:Marjorie Morgan
The ISA and ANSI released a new report titled The Financial Impact of Breached Protected Health Information which explores the reputational, financial, legal, operational, and clinical repercussions of a protected health information breach on an organization...
March 05, 2012 Added by:alan shimel
This first installment of what promises to be a semi-annual report sheds some real light on the differences between on premises and cloud security environments, and also advances the notion that despite the FUD the cloud may in fact be safer for certain kinds of applications...
March 02, 2012 Added by:Marjorie Morgan
Schmidt is slated to announce the third publication in the Internet Security Alliance's financial cyber risk management series, "The Financial Impact of Breached Protected Health Information: A Business Case for enhanced PHI Security"...
February 16, 2012 Added by:Neira Jones
SQLi was the number one attack vector found in both the Web Hacking Incident Database and the number one Web-based method of entry in incident response investigations. SQL injections were the number one Web application risk of 2011...
February 13, 2012 Added by:Infosec Island Admin
"Malnet infrastructures enable cybercriminals to launch dynamic attacks that are often not detected by traditional anti-virus vendors for days or months. In one case in early February 2011, a malware payload changed locations more than 1,500 times in a single day..."
February 09, 2012 Added by:Scot Terban
China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...
January 31, 2012 Added by:Suzanne Widup
Although 2007 and 2008 grew the most in terms of additional incidents being disclosed, 2008 showed the highest number of additional records, with almost 95 million. Though 2011 is not the highest in terms of incidents, it is now the leader for records disclosed thus far...
January 31, 2012 Added by:Headlines
The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...
January 27, 2012 Added by:Headlines
The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...
January 24, 2012 Added by:Joel Harding
Instead of buying a ship for the relatively cheap price of $15 million, one could simply take control of the ship remotely and guide it into a target from thousand of miles away. Imagine the boom that 135 million cubic yards of natural gas could make if an LNG ship were run aground...
January 04, 2012 Added by:Headlines
"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."
December 29, 2011 Added by:Rafal Los
How much access do those employees and system administrators have to your critical intellectual property, company secrets and other secret information? And how often do they take a peek behind the curtain... you know, just for curiosity?
December 21, 2011 Added by:Ed Moyle
Until recently Chrome supported SSL 2.0 by default (seems like a major no-no in my humble opinion) and the fact that Firefox is the only one of the big three to have OCSP checking enabled by default. This aspect of "browsing security" is a "score one" for Firefox in my estimation...
December 20, 2011 Added by:Stefano Mele
Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...
December 11, 2011 Added by:Bill Gerneglia
“The face of cyber threats has rapidly evolved from curious college kids taking their hand at hacking to an enormous global ecosystem of cyber-crime. Companies need a comprehensive approach to security technology, education and awareness and a very small number have truly mastered all three...”
December 07, 2011 Added by:Dan Dieterle
A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?
Why Bother with Security? [If you’re going... Westley McDuffie on 12-12-2013
Are Security Professionals Exiting the Enter... Westley McDuffie on 12-12-2013
The Security Risks of Remote Support Tools ... Amanda Martin on 12-11-2013