June 24, 2015 Added by:Peter Zavlaris
New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.
June 23, 2015 Added by:Anthony M. Freed
Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.
June 22, 2015 Added by:Steve Durbin
Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.
June 18, 2015 Added by:Malwarebytes
More often than not, the sad truth is that if you’re worrying after the creation stage, you’ve probably left it too late and those juicy secrets are going to escape. Deploying a healthy dose of caution before setting digital pen to paper is always going to pay off.
June 16, 2015 Added by:Peter Zavlaris
The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.
June 16, 2015 Added by:Seth Geftic
While it is not a silver bullet, the security teams that are most successful at defending their organizations have done so by standing up (or at least outsourcing) their own Security Operations Center (SOC).
June 15, 2015 Added by:Steve Durbin
Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.
June 15, 2015 Added by:Anton Chuvakin
For a while, I was under impression that my deep disdain for “insta-FAIL security policies” (i.e. those written without any chance of ever being complied with, even during the policy-writing process) knows no equal.
June 15, 2015 Added by:Dan Lohrmann
By almost any measure, cyber danger doubled last year and hackers are now breaking into enterprise systems, stealing sensitive data and causing business disruption at an unprecedented pace.
June 11, 2015 Added by:Lisa Huff
As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.
June 09, 2015 Added by:Brian Prince
Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.
June 09, 2015 Added by:Tripwire Inc
For those involved with securing privileged information, the news of the latest big breach plastered on every TV, website and newspaper commonly elicits a pair of simultaneous reactions: relief that it’s not your organization and dread that it could be the next time.
June 08, 2015 Added by:Rebecca Herold
Over the years in the security classes I’ve taught, I’ve covered the importance of program change control management, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.
June 04, 2015 Added by:Eduard Kovacs
The trust-based foundations of whitelisting make it more difficult for organizations to properly protect their networks against cyber threats, Kaspersky Lab researchers have warned.
June 03, 2015 Added by:Peter Zavlaris
The unprecedented technological advancement seen over the last two decades has become a double-edged sword. As a result, information security has gone from being a tertiary IT function to a significant operational risk.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015