Latest Posts

306708aaf995cf6a77d3083885b60907

FBI Says North Korea Was Behind Sony Hack

December 19, 2014 Added by:Mike Lennon

The FBI has officially called out North Korea as being responsible for the recent high profile cyber attack on Sony Pictures.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Should I Use “SIEM X” or “MSSP Y”?

December 18, 2014 Added by:Anton Chuvakin

Lately I’ve been surprised by some organizational decision-making as they think about their sourcing choices for security monitoring.

Comments  (0)

65be44ae7088566069cc3bef454174a7

5 Effective Ways to Raise Privacy Awareness

December 18, 2014 Added by:Rebecca Herold

Here are five of the ways that I’ve found to be very effective for raising privacy awareness throughout the years.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Top 10 Phishing Attacks of 2014

December 16, 2014 Added by:Ronnie Tokazowski

While attackers are loading up their phishing emails with new malware all the time, the majority of their phishing emails use stale, recycled content.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Debunking The Biggest Cyber Security Myths for Businesses

December 16, 2014 Added by:Tripwire Inc

A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

How To Exit an MSSP Relationship?

December 15, 2014 Added by:Anton Chuvakin

Let me touch a painful question: when to leave your managed security services provider?

Comments  (0)

65be44ae7088566069cc3bef454174a7

The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

December 12, 2014 Added by:InfosecIsland News

Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.

Comments  (1)