June 29, 2015 Added by:Shawn Masters
Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection
June 25, 2015 Added by:Eduard Kovacs
Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.
June 25, 2015 Added by:Anton Chuvakin
As a security technologist you may be asked to do the impossible.
June 24, 2015 Added by:Peter Zavlaris
New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.
June 23, 2015 Added by:Anthony M. Freed
Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.
June 22, 2015 Added by:Steve Durbin
Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.
June 18, 2015 Added by:Malwarebytes
More often than not, the sad truth is that if you’re worrying after the creation stage, you’ve probably left it too late and those juicy secrets are going to escape. Deploying a healthy dose of caution before setting digital pen to paper is always going to pay off.
June 16, 2015 Added by:Peter Zavlaris
The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.
June 16, 2015 Added by:Seth Geftic
While it is not a silver bullet, the security teams that are most successful at defending their organizations have done so by standing up (or at least outsourcing) their own Security Operations Center (SOC).
June 15, 2015 Added by:Steve Durbin
Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.
June 15, 2015 Added by:Anton Chuvakin
For a while, I was under impression that my deep disdain for “insta-FAIL security policies” (i.e. those written without any chance of ever being complied with, even during the policy-writing process) knows no equal.
June 15, 2015 Added by:Dan Lohrmann
By almost any measure, cyber danger doubled last year and hackers are now breaking into enterprise systems, stealing sensitive data and causing business disruption at an unprecedented pace.
June 11, 2015 Added by:Lisa Huff
As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.
June 09, 2015 Added by:Brian Prince
Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015