September 24, 2014 Added by:Tripwire Inc
You may find this surprising… 18 months is a year and a half of attackers wandering around, looting sensitive data while remaining undetected.
September 23, 2014 Added by:Wendy Nather
One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.
September 17, 2014 Added by:Patrick Oliver Graf
America’s largest home improvement retailer seems to have a repair for everything, but after news that its payment systems had been breached, Home Depot has a lot of work ahead to get its own house in order. It faces a long road as it repairs its reputation, its relationships with customers and its network security.
September 17, 2014 Added by:Sahba Kazerooni
When all is well, there is nothing to worry about. A poorly configured backup system, however, can make life more than a little tricky when you can’t restore your files effectively or efficiently.
September 10, 2014 Added by:Patrick Oliver Graf
The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...
September 09, 2014 Added by:Rafal Los
Information Security leadership has and will likely continue to be part politicking, part sales, part marketing, and part security
September 04, 2014 Added by:Paul Lipman
Small and medium size businesses tend not to have the budget, resources or skills to tackle the increasingly complex security challenge on their own, and are increasingly turning to Managed Service Providers (MSPs) to protect their data, network, employees, and customers from cybercrime.
Collective Self-defense: What Japan’s New Defense Policy Means for International Cooperation on Cyber Security
September 04, 2014 Added by:Mihoko Matsubara
Joint exercises are key to making joint operations seamless and increasing the capability of cyber defenses. The Japanese and US governments have committed themselves to revise the US–Japan Defense Cooperation Guidelines by the end of this year and to include bilateral cooperation on cyber security in the revision.
September 03, 2014 Added by:Eduard Kovacs
The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.
August 28, 2014 Added by:Rafal Los
Security professionals continue to fool themselves into believing we walk a delicate balance between keeping the business functional, and keeping it safe (secure).
August 25, 2014 Added by:Wendy Nather
There are a few movements afoot to help improve security, and the intentions are good. However, to my mind some are just more organized versions of what we already have too much of: pointing out what's wrong, instead of rolling up your sleeves and fixing it.
Infographic: Keeping Web Applications Safe... on 12-17-2014
Debunking The Biggest Cyber Security Myths ... on 12-17-2014
Top 10 Phishing Attacks of 2014... on 12-17-2014