Latest Posts


FBI Says North Korea Was Behind Sony Hack

December 19, 2014 Added by:Mike Lennon

The FBI has officially called out North Korea as being responsible for the recent high profile cyber attack on Sony Pictures.

Comments  (0)


Should I Use “SIEM X” or “MSSP Y”?

December 18, 2014 Added by:Anton Chuvakin

Lately I’ve been surprised by some organizational decision-making as they think about their sourcing choices for security monitoring.

Comments  (0)


5 Effective Ways to Raise Privacy Awareness

December 18, 2014 Added by:Rebecca Herold

Here are five of the ways that I’ve found to be very effective for raising privacy awareness throughout the years.

Comments  (0)


What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (3)


Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (0)


Top 10 Phishing Attacks of 2014

December 16, 2014 Added by:Ronnie Tokazowski

While attackers are loading up their phishing emails with new malware all the time, the majority of their phishing emails use stale, recycled content.

Comments  (1)


Debunking The Biggest Cyber Security Myths for Businesses

December 16, 2014 Added by:Tripwire Inc

A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Comments  (1)


How To Exit an MSSP Relationship?

December 15, 2014 Added by:Anton Chuvakin

Let me touch a painful question: when to leave your managed security services provider?

Comments  (0)


The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)


Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

December 12, 2014 Added by:InfosecIsland News

Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.

Comments  (1)