Top Stories

959779642e6e758563e80b5d83150a9f

10 Ways to Detect Employees Who Are a Threat to PHI

May 26, 2015 Added by:Danny Lieberman

Most people who don’t work in security, assume that the field is very technical, yet really – it’s all about people.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Threat Intelligence: Knowledge is Power

May 26, 2015 Added by:Lisa Huff

Organizations have made massive investment in a variety of security solutions over the years. It is important to understand what investments that have made in security technologies in order to understand the success and possible challenges that they face.

Comments  (0)

Latest Posts

Af7244bb99debb4a1152fa49a993a05c

New Global Initiative Aims at Securing Smart Cities

May 28, 2015 Added by:Eduard Kovacs

Security researchers, companies and organizations have joined forces in a new non-profit global initiative whose goal is to secure smart cities.

Comments  (0)

6d117b57d55f63febe392e40a478011f

IEEE Takes Lead in Medical Device Security Standards

May 28, 2015 Added by:Anthony M. Freed

The Institute of Electrical and Electronics Engineers (IEEE) has taken the lead in medical device security standards with the release of Building Code for Medical Device Software Security, a set of guidelines to encourage companies to establish a secure baseline for medical software development and production practices.

Comments  (0)

96f253cc8b3e78f1160a605fb9b56530

More Than Meets the Eye

May 28, 2015 Added by:Chris Elisan

The philosophy of hiding in plain sight has been used both by the good and the bad guys. But the effect of hiding in plain sight is much more pronounced when applied to a malicious attack.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Threat Intelligence Sharing Valued, But Many Not Doing it: Survey

May 27, 2015 Added by:Brian Prince

Enterprises may largely agree that threat intelligence is important, but few are doing any actual sharing themselves, according to a new survey.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Sign of the Times: Verizon Breach Report Tracks New Category

May 27, 2015 Added by:Peter Zavlaris

This year’s Verizon Data Breach Investigations Report (VDBIR) added a new category to its VERIS (Vocabulary for Event Recording and Incident Sharing) to track attacks with “secondary” motives.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Outsourcing Remote Access Management Isn't The Answer For SMBs

May 27, 2015 Added by:Patrick Oliver Graf

So, should network administrators consider tapping into MSPs for network security in our current environment? The core issue is a common one in network security – convenience vs. security.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Threat Intelligence: Knowledge is Power

May 26, 2015 Added by:Lisa Huff

Organizations have made massive investment in a variety of security solutions over the years. It is important to understand what investments that have made in security technologies in order to understand the success and possible challenges that they face.

Comments  (0)

959779642e6e758563e80b5d83150a9f

10 Ways to Detect Employees Who Are a Threat to PHI

May 26, 2015 Added by:Danny Lieberman

Most people who don’t work in security, assume that the field is very technical, yet really – it’s all about people.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

SSL and TLS Update

May 26, 2015 Added by:PCI Guru

The answer to SSL and TLS vulnerabilities are to remediate as soon as possible. If you are unable to remediate, then you need to mitigate the risk until you can remediate.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Cloud Security Monitoring … Revisited (aka It Is Not 2012 Anymore!)

May 26, 2015 Added by:Anton Chuvakin

My next project, now that I am done with security analytics for now, is to revisit our cloud security monitoring work.

Comments  (0)