January 28, 2015 Added by:Anthony M. Freed
But the four cybersecurity legislation bills that were approved last month did not address all of the top concerns, namely the creation of an information-sharing platform that would enable better information exchange about cyber-based threats between the public and private sectors.
January 27, 2015 Added by:Eduard Kovacs
Researchers reported earlier this month that Google was no longer patching vulnerabilities affecting the WebView component in Android Jelly Bean (4.3) and prior.
January 26, 2015 Added by:Tripwire Inc
Over the past few years, we have seen cybersecurity move from the realm of IT into the boardroom and now onto the political stage. The reason for this is clear—the resiliency, security and safety of the Internet is critical to our economy and the progress of our society as a whole. It is our future.
January 26, 2015 Added by:Dan Dieterle
You have a remote shell to a Windows box in Metasploit, very cool, but what can you do?
January 22, 2015 Added by:Joe Weiss
I have seen few attempts to provide guidance to end-users about common issues with control system cyber incidents that transcend industries and even national boundaries. The following was a result of a discussion with a relevant entity about a domestic fossil plant cyber incident and its commonality to several other plant cyber incidents.
January 20, 2015 Added by:Joe Weiss
The North American Electric Corporation (NERC) Critical Infrastructure Protection (CIP) cyber security standards were developed to increase the cyber security and reliability of the electric grid. Unfortunately, they are not doing either.
January 19, 2015 Added by:Patrick Oliver Graf
One month ago, we asked, “What network security lessons can we learn from the Sony attack?” Since then, new information has been slow to trickle out, save for the FBI’s mid-December statement that assigned responsibility to the North Korean government.
January 07, 2015 Added by:Michael Leland
Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.
January 05, 2015 Added by:Thu Pham
Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.
January 05, 2015 Added by:Paul Lipman
The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.
January 01, 2015 Added by:Scott Garber
While evaluating the Sony hack and explosion of related press, our team discovered an eerie tie-in to the titles and taglines in Sony Pictures massive movie library, which might have been an early indicator of the inevitable breach.
December 23, 2014 Added by:PCI Guru
I am watching the news reports on the Sony breach and laughing at all of the “facts” that are being bandied about. I want to use the Sony breach as a teachable moment and explain that the “facts” may not be as factual as represented by the media, forensic examiners or even the FBI.
December 22, 2014 Added by:Joe Weiss
With all of the focus on cyber security one could expect that DHS is doing a credible job in helping to protect our country. Unfortunately, that may not be the case.
December 17, 2014 Added by:Patrick Oliver Graf
Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.
December 17, 2014 Added by:Pierluigi Paganini
The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.
Mobile Security Processes Could Be Applied t... Mike Keller on 01-30-2015
Paying Lip Service (Mostly) to User Educatio... Electra Melina on 01-29-2015
Digital Reputation: Can’t Buy it, Gotta Ea... Eden Connie on 01-29-2015