January 21, 2015 Added by:Tripwire Inc
As we go about our daily lives, we are leaving subliminal digital traces behind us from our logical footprint.
January 20, 2015 Added by:Joe Weiss
The North American Electric Corporation (NERC) Critical Infrastructure Protection (CIP) cyber security standards were developed to increase the cyber security and reliability of the electric grid. Unfortunately, they are not doing either.
January 20, 2015 Added by:Amit Serper
If we didn’t already get the memo in 2014, the Sony hack serves as a harsh reminder of how easy it is for attackers to hide undetected, inside a network for long periods of time.
January 19, 2015 Added by:Brent Huston
It would be nice to be able to say that we are winning the war; that network security efforts are slowly getting the better of the bad guys. But I can’t do that.
January 19, 2015 Added by:Carson Sweet
Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.
January 15, 2015 Added by:Electronic Frontier Foundation
Verizon advertising partner Turn has been caught using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them with dozens of major websites and ad networks, forming a vast web of non-consensual online tracking.
January 07, 2015 Added by:Michael Leland
Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.
January 06, 2015 Added by:Joe Weiss
The interconnected networking of control and safety systems is making these processes much more productive, but more cyber vulnerable, and potentially less safe.
January 05, 2015 Added by:Thu Pham
Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.
December 31, 2014 Added by:Patrick Oliver Graf
Although it’s been a historically troubling year for the cybersecurity community, the advantage of a new year is that network administrators can make a fresh start.
December 30, 2014 Added by:Tripwire Inc
A great way to begin to secure your organization is to get a baseline of where you are now and set goals to improve your security stature.
December 29, 2014 Added by:Pierluigi Paganini
The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance.
December 24, 2014 Added by:Brian Prince
A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015