Blog Posts Tagged with "report"

69dafe8b58066478aea48f3d0f384820

UK Cabinet Office Report: The Cost of Cyber Crime

July 26, 2011 Added by:Headlines

The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Deliver Cyber War Policy Brief

July 22, 2011 Added by:Headlines

"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over 140,000 Children Victims of Identity Fraud Yearly

July 13, 2011 Added by:Headlines

"Child identity fraud poses complex challenges to consumers, businesses and regulators. Unfortunately, minors' identities are particularly appealing to fraudsters because their personal data is untainted, legitimate and less likely to be monitored for misuse..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Data Breaches Are Up While Lost Records Are Down

July 06, 2011 Added by:Robert Siciliano

There are now multiple breach lists, and not all define a data breach the same way. According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee: Attacks on South Korea Likely Cyberwar Exercise

July 06, 2011 Added by:Headlines

"This may have been a test of South Korea’s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers... the attack itself was very limited and may have been utilized to test and observe how quickly the attack would be discovered, reverse engineered, and mitigated..."

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Thoughts on Trustwave's 2011 Global Security Report

June 22, 2011 Added by:Robb Reck

We bring in these third party vendors because we trust that they have all the experience and knowledge with a given security product. But they are missing a critical piece: Experience with our systems. No technology solution is complete and ideal for every environment out of the box...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Seventy-Seven Percent of Organizations Lost Data

June 09, 2011 Added by:Headlines

“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."

Comments  (0)

E973b16363b3de77b360563237df7e32

Examining the Sources of Security Incidents

June 06, 2011 Added by:Bozidar Spirovski

Security incidents come in all shapes and sizes. They can affect availability, confidentiality or integrity. Shortinfosec organized a Linkedin poll to observe the opinions of the professionals on what are the sources of security incident that they deem most frequent...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Three Employees Admit Taking Risks with Data

June 03, 2011 Added by:Headlines

"Businesses can make the mistake of viewing data security as an on-site issue. Often the risks can lie with physical loss or with personal computers. Firms should identify how their staff transfer and handle business documents outside of the work-place, and minimize the risks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Should Halt Suspicionless Searches at Border

June 01, 2011 Added by:Headlines

"The continual evolution in how people use electronic devices in their everyday lives creates growing tension between the Fourth Amendment guarantees and what historically has been viewed as a narrow exception to the requirements for probable cause and a warrant..."

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Gartner's SIEM Magic Quadrant 2011

May 29, 2011 Added by:Anton Chuvakin

I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Joint U.S.-China Report on Cybersecurity Released

May 27, 2011 Added by:Headlines

"In a time when most can only see a grim, downward spiral of recrimination when it comes to all things cyber, this report is the product of cooperation and offers some hope for an improved relationship between China and the US..."

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Verizon Report: Hackers Target Small Businesses

May 26, 2011 Added by:Kelly Colgan

Hackers are changing their tactics and chasing opportunities. Black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Spammers Creating Fake URL Shorteners

May 25, 2011 Added by:Headlines

“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mobile Network Operators Lack PCI DSS Compliance

May 25, 2011 Added by:Headlines

“The survey shows that there is clearly room for improvement by the mobile operator community in addressing PCI DSS compliance, and it is critical that operators not yet compliant take appropriate measures to ensure the security of their customer’s sensitive cardholder data..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Research Reveals Widespread Vulnerability to Phishing

May 24, 2011 Added by:Headlines

Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »