Items Tagged with "report"


Companies Exposing Critical SAP Services to the Internet

June 19, 2012 Added by:Alexander Polyakov

For example, 212 SAP Routers were found in Germany which were created mainly to route access to internal SAP systems. SAP Routers themselves can have security misconfigurations, but the real problem is that 8% of the companies expose SAP Dispatcher services directly to the Internet, circumventing the SAP Router...

Comments  (0)


ENISA Report: The Threat from Flamer

June 12, 2012

Flamer, according to technical analyses of various security teams, is a stealthy information stealer hitting hundreds of targeted PC users across the Middle East. However, it should not be dismissed on the grounds of geography or numbers affected. ENISA has published an analysis of the threat...

Comments  (0)


EWI: The Internet Health Model for Cybersecurity

June 04, 2012

“A public health model encompasses several interesting concepts that can be applied to internet security. As use and reliance on the Internet continues to grow, improving Internet health requires all ecosystem members to take a global, collaborative approach to protecting people from potential dangers online”...

Comments  (0)


New Study Published on Mobile Malware

May 23, 2012 Added by:Beau Woods

Two malware families show that authors have incorporated many sophisticated features to help circumvent detection and frustrate researchers attempting to study the samples, among other things. And their analysis showed that mobile malware is rapidly maturing...

Comments  (0)


CyLab: Utilities Rank Worst in Governance and Security

May 23, 2012 Added by:Headlines

“Of the... respondents, the energy/utilities sector had the poorest governance practices. When asked whether their organizations were undertaking six best practices for cyber governance, the... sector ranked last for four of the practices and next to last for the other two..."

Comments  (0)


Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)


From Fraud to Infosec and Vice Versa... Part 1

April 18, 2012 Added by:Neira Jones

To all of you infosec professionals out there: one way to show you add value is get closer to your fraud colleagues and try to understand what their big ticket items are. You can even ask them the right questions as the big ticket items are more than likely those detailed here...

Comments  (0)


Data Breach Study Finds Breach Costs Have Fallen

April 13, 2012 Added by:David Navetta

The latest CDBS study can be considered a bookend to Verizon’s annual DBIR. The two reports paint a data breach landscape that continues to change. For the first time in seven years, both the organizational cost of data breach and the cost per lost or stolen record have declined...

Comments  (0)


It’s Data Breach Report Season: Beware Of Partial Truths

April 01, 2012 Added by:Josh Shaul

At the end of the day, these reports are important. They provide much needed insight into at least some data breaches. But we have to accept that this isn't the U.S. Census. We must learn what we can from them without becoming hypnotized by the hype that can surround them...

Comments  (1)


GAO Report: IT Supply Chain Security Risks

March 30, 2012

The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...

Comments  (0)


Vendor Research: Look These Gift Horses in the Mouth

March 29, 2012 Added by:Jack Daniel

The problem is that a lot of the data leaves me wanting more. More details on the data we get, just plain “more data”, and more context. I also want more honesty about the shortcomings of the reports and data. Let’s not even talk about some of the bizarre conclusions...

Comments  (0)


Average Cost of a Data Breach $5.5 Million in 2011

March 23, 2012 Added by:Headlines

“Insiders continue to pose a serious threat to the security of their organizations. This is particularly true as the increasing adoption of tablets, smart phones and cloud applications in the workplace means that employees are able to access corporate information anywhere..."

Comments  (0)


ENISA: An Economic Model for Pricing Personal Information

March 23, 2012

The main goal of this report is to enable a better understanding of the interaction of personalization, privacy concerns and competition between online service providers. Consumers benefit from personalization of products on the one hand, but might be locked in to services on the other...

Comments  (0)


Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)


Nearly Five Percent of All Smartphones Lost Every Year

March 20, 2012 Added by:Robert Siciliano

Based on the costly consequences of lost data assets, it makes sense to allocate the necessary resources to invest in anti-theft and data protection solutions in order to secure smartphones and the sensitive and confidential information they contain...

Comments  (0)


Malware Development Exceeding IT Security Capabilities

March 16, 2012 Added by:Headlines

"Organizations that do plan to beef up their security capabilities will have a difficult time this year. Just under half believe it will be harder this year than in the past to find malware analysts and a similar number state they will have less time to train analysts this year..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »