Latest Posts

0a8cae998f9c51e3b3c0ccbaddf521aa

The Indelicate Balance Between "Keep it Working" and "Keep It Safe"

August 28, 2014 Added by:Rafal Los

Security professionals continue to fool themselves into believing we walk a delicate balance between keeping the business functional, and keeping it safe (secure).

Comments  (0)

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Backoff PoS Malware: Are You Infected and Don't Know It?

August 27, 2014 Added by:Tripwire Inc

According to the Secret Service, Backoff malware has affected an additional 1,000 businesses, hit by the same type of cyberattack that stole the personal information of millions of Target customers last year. “

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Thousands of Vulnerabilities in NOAA Satellite System

August 27, 2014 Added by:Dan Dieterle

According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Avoid this Common Privacy Choice Mistake

August 26, 2014 Added by:Rebecca Herold

Many marketing professionals have a common temptation; they want to send as many marketing messages to as many people as possible, and they would love to send it to all folks who have ever been customers or clients of their business, and often times actually want to simply send to everyone whose email address they can obtain in any way.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

P2PE Versus E2EE

August 25, 2014 Added by:PCI Guru

I have been encountering a lot of organizations that are confused about the difference between the PCI SSC’s point-to-point encryption (P2PE) certified solutions and end-to-end encryption (E2EE). This is understandable as even those in the PCI community are confused as well.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

How to Help

August 25, 2014 Added by:Wendy Nather

There are a few movements afoot to help improve security, and the intentions are good. However, to my mind some are just more organized versions of what we already have too much of: pointing out what's wrong, instead of rolling up your sleeves and fixing it.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 2 of 2)

August 21, 2014 Added by:Identropy

An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

NERC CIPS and Keeping Lights On – Are They the Same?

August 21, 2014 Added by:Joe Weiss

August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.

Comments  (0)