September 23, 2015 Added by:Ilia Kolochenko
The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.
September 09, 2015 Added by:Jayson Wylie
Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.
September 01, 2015 Added by:InfosecIsland News
In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
August 18, 2015 Added by:Mike Lennon
Microsoft issued an emergency out-of-band update to fix a critical vulnerability (CVE-2015-2502) being actively exploited in the wild and affecting all versions of Internet Explorer from IE 7 through 11.
August 04, 2015 Added by:Steve Durbin
Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...
July 17, 2015 Added by:Alexander Polyakov
As all university networks are complex and consist of numerous modules and there are numerous vulnerabilities in them, protecting them seems a nightmare for any IT team. Cybersecurity is not some separate steps taking from time to time, but the ongoing process.
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
June 29, 2015 Added by:Shawn Masters
Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection
June 25, 2015 Added by:Eduard Kovacs
Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.
June 25, 2015 Added by:Anton Chuvakin
As a security technologist you may be asked to do the impossible.
June 24, 2015 Added by:Peter Zavlaris
New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015