December 09, 2014 Added by:Patrick Oliver Graf
Much to the dismay of network administrators, IT security today is complex and multi-faceted, from the varied attack vectors to the different types of attackers themselves. But there is always one constant: the endpoint.
December 05, 2014 Added by:Paul Lipman
The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...
December 04, 2014 Added by:Thu Pham
The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?
December 04, 2014 Added by:Joe Weiss
This is not an “I told you so” note. It is a note expressing concern that our critical infrastructure organizations such as NERC, FERC, NRC, NEI, AWWA, and others do not appear to be taking this threat seriously.
December 04, 2014 Added by:Electronic Frontier Foundation
Following recent reports in the Wall Street Journal and Ars Technica, there’s been new interest in the government’s use of a relatively obscure law, the All Writs Act.
December 03, 2014 Added by:Steve Durbin
Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...
December 03, 2014 Added by:Patrick Oliver Graf
In this “post-privacy” era, network administrators need to understand cyber threats against them, inside and out, in order to set up the strongest defenses.
December 02, 2014 Added by:Pierluigi Paganini
According to the Reuters Agency, the malicious code described in the alert could be the attack vector used by threat actors in the incident occurred to the Sony Pictures.
December 01, 2014 Added by:Tripwire Inc
The logic is – if cybersecurity is weak today (and the average Joe has no idea how truly breached our Internet fabric is), it may be even worse tomorrow with the advent of explosive IoT capabilities. Here’s why I say that.
November 25, 2014 Added by:Tripwire Inc
There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.
November 19, 2014 Added by:Tripwire Inc
Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.
November 19, 2014 Added by:Brent Huston
What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?
November 18, 2014 Added by:Electronic Frontier Foundation
Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.
November 18, 2014 Added by:Patrick Oliver Graf
One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.
November 17, 2014 Added by:Joe Weiss
In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.
Tips for Writing Good Security Policies... james silva on 02-27-2015
The Three Human Failures Behind Remote Acces... Jeanson Ancheta on 02-27-2015
Hacker to Release Symantec's PCAnywhere Sour... sudhanshu Mishra on 02-27-2015