January 22, 2015 Added by:Patrick Oliver Graf
Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?
January 21, 2015 Added by:Brian Prince
According to a new survey of 172 IT decision makers and influencers in both enterprises and small to midsized businesses, 28 percent of organizations are not getting the most bang for their buck when it comes to their security investments.
January 15, 2015 Added by:Tripwire Inc
If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.
January 14, 2015 Added by:Kevin L. Jackson
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.
January 12, 2015 Added by:Brent Huston
Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.
January 08, 2015 Added by:Tripwire Inc
The question of whether it makes sense to attack your cyber attackers isn’t new—this has been a debate in the infosec community for quite a while. In my opinion, in most cases the answer is “No, companies shouldn’t attack back.”
January 07, 2015 Added by:Patrick Oliver Graf
It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter.
January 05, 2015 Added by:Thu Pham
Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.
January 05, 2015 Added by:Paul Lipman
The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.
December 24, 2014 Added by:Brian Prince
A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.
December 22, 2014 Added by:Rebecca Herold
Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.
Join the Security Intelligence Network on Li... Robin Joan on 01-25-2015
Steps Toward Weaponizing the Android Platfor... Robin Joan on 01-25-2015
Today's Mobile Device Data Protection Must G... Robin Joan on 01-25-2015