May 19, 2014 Added by:Dan Dieterle
For years China has turned to hacking to close the technology gap between them and other nations. Termed “cyber-espionage”, Chinese hackers targeted hi-tech US companies and stole confidential research and development data.
March 10, 2014 Added by:Electronic Frontier Foundation
We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications Surveillance...as a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.
January 30, 2014 Added by:Joe Franscella
The Security Blogger Network (SBN), the largest collection of information-security-focused blogs and podcasts in the world, has announced the SBN Social Security Awards 2014 finalists.
November 26, 2013 Added by:Danny Banks
Innovative enterprise security teams realize the importance of security event data and are changing the way they collect and store information for greater insight into the threat landscape.
November 12, 2013 Added by:Jason Clark
Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.
September 02, 2013 Added by:Pierluigi Paganini
Former LulzSec leader Sabu (Hector Xavier Monsegur) accused by the hacker Jeremy Hammond to have incited state-sponsored attack for the U.S. Government.
August 08, 2013 Added by:Jon Stout
he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.
August 07, 2013 Added by:Jon Stout
The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...
August 01, 2013 Added by:Joe Franscella
On Wednesday, National Security Agency (NSA) Director General Keith Alexander informed a rather tame crowd (with the exception of one or two hecklers) that his agency isn’t interested in phone or other digital communications unless they impact foreign intelligence gathering or involve known or suspected terrorists. A day later a couple’s home was raided after the husband and wife searched “p...
August 01, 2013 Added by:Jon Stout
There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.
July 26, 2013 Added by:Joe Franscella
Black Hat USA 2013 (@blackhatevents) kicks off Saturday, running through next Wednesday – what a busy and exciting time for everyone in the cybersecurity industry and the news and PR machines.
July 26, 2013 Added by:Joe Franscella
Northern Virginia-based startup @PhishMe, a company that has made a good name for itself as a cloud-based phishing email penetration tester and trainer, announced an interesting contest on its blog last week called the “The Double Barrel Throwdown 2013.”
July 17, 2013 Added by:Joe Franscella
“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back. While there isn't any recognized authority on the subject per se, there are at least some credible sources providing guidance that can help those of us in the industry to decide on "when, why and how" to use the ...
July 15, 2013 Added by:Tom Eston
Check your privacy settings to make sure your private information doesn’t easily show up in Facebook’s new search engine
July 01, 2013 Added by:Joe Franscella
How often do cybersecurity reporters like to tell attack victims' stories? How often are victims willing to go on record about them? Answers: frequently and never.
OTA's Sixth Annual Online Trust Forum... Cao nguyen on 10-22-2014
What PCI Requirements Apply to Us: Tacking a... Sarah James on 10-21-2014