Latest Blog Posts


ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)


Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)


An Interview with David Jones, CTO at ThreatMetrix

April 19, 2010 Added by:Anthony M. Freed

I recently had the opportunity to interview David Jones, CTO and Vice President of Engineering at ThreatMetrix, who has more than 15 years experience in technical and management roles in the software industry.

Comments  (1)


Security Compliance in a Cloud

April 19, 2010 Added by:Mark Gardner

For this inaugural post I have decided to tackle, what I perceive to be one of the biggest conundrums within the growth area of Cloud Computing, Security Compliance. I use the term conundrum, not that I believe for one second that Cloud Computing does not need Security and some form of compliance, far from it, but that suddenly these seem to have become show stopping issues for the uptake...

Comments  (6)


Marching toward a Global Security Standard

April 19, 2010 Added by:Aaron Simmons

The list of Security regulations is growing and we are headed towards a Global Security Standard.  Where do you see Security standards moving towards?  Is ISO the right environment to wrap all security standards in a nice pretty package?  Do we create additional functions within the scope of ISO 27000 to include the necessary items for the above regulations? 

Comments  (0)


1.5 Million Americans Have Been Victims of Medical IdentityTheft

April 17, 2010 Added by:Robert Siciliano

According to a recent Ponemon Institute study, nearly 1.5 million Americans have been victims of medical identity theft with an estimated total cost of $28.6 billion–or approximately $20,000 per victim. [1] Further evidence of the significance of the medical fraud problem is the allocation of $1.7 billion for fraud detection in the 2011 U.S. Health and Human Services Department budge...

Comments  (0)


5 Tips to Strengthen Network Security with Limited Budgets

April 16, 2010 Added by:Ray Tan

Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.

Comments  (4)


Self-revelation Can Help Assemble a Social Security Number

April 16, 2010 Added by:Robert Siciliano

I am not done nor will I ever be done sounding that alarm, ringing that bell and informing you about how ridiculous social media is. I was asked in a radio interview today what it will take to get people to recognize they are sharing too much data. In a word, tragedy. When a home is broken into, they install a home security alarm. When someone is mugged, they take a self defense course. When plane...

Comments  (0)


A PCI DSS Overview

April 16, 2010 Added by:Mike Meikle

As a consultant, you get to view the grim expanse of industry regulation more than most.  Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA) and of course the topic of this article, Payment Card Industry Data Security Standard (PCI DSS).

Comments  (0)


How to be exposed via xss - in one click - just doing your job...

April 16, 2010 Added by:Jason Remillard

As the attacks on infrastructure become more complicated, the true nature of deep penetration attacks prove food for thought for all developers and operators.  Consider this case - where the apache open source infratructure itself became significantly exposed by a simple XSS attack that utilized some social engineering techniques (i.e. getting folks to click on things), to load others up with...

Comments  (2)


Privacy and Cloud Computing Challenges

April 16, 2010 Added by:Rebecca Herold

The concept of “cloud computing” is not well known by most folks. Certainly not the personnel using a vast and growing number of cloud computing applications, without even know it, from business networks. If they don’t know what they are using, then how can they know the information security and privacy risks involved?

Comments  (0)


Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)


Do You Spy on Your Spouse?

April 15, 2010 Added by:Robert Siciliano

Generally in a trusting relationship spying isn’t necessary. I’m sure Sandra Bullock, Kate Gosselin or Tiger Wood’s wife didn’t think they needed to spy on their husbands, until they did. Reckless behavior like that can bring home a very itchy or very deadly disease.  One that victimizes the innocent.

Comments  (2)


The inevitable fate of Smartphones

April 15, 2010 Added by:Aaron Simmons

Now that Smartphones are the norm, have you ever wondered about its security? Whether you are carrying an iPhone, Android, Blackberry or one of the myriad of smartphones that are on the market today, security must be a constant thought.

Comments  (0)


How to Detect a Mac Flooding Attack

April 15, 2010 Added by:Ray Tan

Ever since the beginning of the Internet, we have been facing ever increasing threats which can affect the stability and usability of your network. Nowadays, our businesses rely on their networks and the Iinternet more and more, but how can we prevent being attacked by hackers?

Comments  (0)


An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)

« First < Previous | 469 - 470 - 471 - 472 - 473 | Next > Last »