April 12, 2015 Added by:Mike Lennon
FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.
April 10, 2015 Added by:Paul Lipman
While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.
April 07, 2015 Added by:Identropy
As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment. On the bright side, these organizations have a very strong security foundation in place for internally hosted applications.
April 06, 2015 Added by:Anthony M. Freed
In a recent survey of security professionals conducted at the e-Crime Congress, 16% of respondents said they support laws that would result prison sentences for executives and Boards of Directors for any negligence on their part following a major data breach.
April 06, 2015 Added by:Tripwire Inc
As reported by the 2013 Europol Serious & Organized Threat Assessment, the “Total Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.”
April 06, 2015 Added by:PCI Guru
Not surprisingly, I have a number of comments based on what I have read. There are some good things that have come out of this effort. But in my opinion, the committee missed the boat in a few areas and those will lead to even more confusion between penetration testers, QSAs and clients.
April 01, 2015 Added by:Brian Prince
Negotiating with criminals is risky, but it is apparently a risk some people are willing to take if it is going to get them their data back.
March 31, 2015 Added by:Brian Prince
While 53 percent said threat intelligence was critical to having a strong security posture, 47 percent did not agree.
March 31, 2015 Added by:Anthony M. Freed
As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.
March 31, 2015 Added by:Identropy
Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment
March 31, 2015 Added by:Tripwire Inc
To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.
March 30, 2015 Added by:Brent Huston
There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.
March 30, 2015 Added by:InfosecIsland News
Please join us on Tuesday, March 31 at 1PM ET for a special webcast: How to Manage Mac and mobile devices leveraging your existing infrastructure, presented by Centrify.
The Government Says It Has a Policy on Disclosing Zero-Days, But Where Are the Documents to Prove It?
March 30, 2015 Added by:Electronic Frontier Foundation
Despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015