Infosec Island News

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Failures: Value of the Human Firewall

August 07, 2013 Added by:Jon Stout

The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...

Comments  (0)

Default-avatar

Gen. Alexander Can’t Access Daughters' Emails, Says NSA Only Interested in Terrorists

August 01, 2013 Added by:Joe Franscella

On Wednesday, National Security Agency (NSA) Director General Keith Alexander informed a rather tame crowd (with the exception of one or two hecklers) that his agency isn’t interested in phone or other digital communications unless they impact foreign intelligence gathering or involve known or suspected terrorists. A day later a couple’s home was raided after the husband and wife searched “p...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (2)

Default-avatar

Black Hat News Storm Underway; Cisco, Big Card Hacks Also Making Hay

July 26, 2013 Added by:Joe Franscella

Black Hat USA 2013 (@blackhatevents) kicks off Saturday, running through next Wednesday – what a busy and exciting time for everyone in the cybersecurity industry and the news and PR machines.

Comments  (0)

Default-avatar

PhishMe Hopes to Reel in Originality, Persuasiveness, Realism; Wins Own Contest by Default

July 26, 2013 Added by:Joe Franscella

Northern Virginia-based startup @PhishMe, a company that has made a good name for itself as a cloud-based phishing email penetration tester and trainer, announced an interesting contest on its blog last week called the “The Double Barrel Throwdown 2013.”

Comments  (0)

Default-avatar

Cybersecurity vs. Cyber Security: When, Why and How to Use the Term

July 17, 2013 Added by:Joe Franscella

“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back. While there isn't any recognized authority on the subject per se, there are at least some credible sources providing guidance that can help those of us in the industry to decide on "when, why and how" to use the ...

Comments  (2)

53692ae1a8e713373b8a487ce89ee3e2

The New Facebook Graph Search: How You’re Helping Hackers Gather Information

July 15, 2013 Added by:Tom Eston

Check your privacy settings to make sure your private information doesn’t easily show up in Facebook’s new search engine

Comments  (8)

Default-avatar

Trend Spotting @BlackHatEvents: Did I Mention the Irony @BrianKrebs is Bringing?

July 01, 2013 Added by:Joe Franscella

How often do cybersecurity reporters like to tell attack victims' stories? How often are victims willing to go on record about them? Answers: frequently and never.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

F2792196079f2c16cd02be6e9ff5b3da

Why are Cybercrimes NOT Always White-collar Crimes?

June 17, 2013 Added by:DHANANJAY ROKDE

A generic definition of a crime would be an act that is in violation of the applicable laws.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

Da3ca2c61c4790bcbd81ebf28318d10a

Digital Natives, Digital Immigrants, Exo-Nationals and The Digital Lord of The Flies

March 29, 2013 Added by:Krypt3ia

There seems to be a disconnect within the psyche for kids where their actions are just not real because it happens online. Some of these kids that I tracked online due to recent events with the attacks on Brian Krebs that leads me to believe some of them may in fact be on the road to sociopathy.

Comments  (1)

Da3ca2c61c4790bcbd81ebf28318d10a

Sun Tzu and the Art of Cyber-War

March 21, 2013 Added by:Krypt3ia

The overall tactics put forth by the Art of War are applicable because this is warfare we are talking about no matter the landscape (electronic) that we are fighting it in.

Comments  (2)

296634767383f056e82787fcb3b94864

Personal Reflections on Suits and Spooks DC 2013

February 13, 2013 Added by:Jeffrey Carr

Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

DARPA on Cyber Targeted-Attack Analyzer program & micro-satellites

February 11, 2013 Added by:Pierluigi Paganini

Protect the country, population and assets from cyber threats, this is a must for every government, a challenge for every state, new processes, large investment and innovative researches are the topics most debated in this period. Yesterday I wrote about the Russian government and its commitment to strengthen cyber defense, today I desire to introduce how US are trying to improve their cyber capa...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »