April 30, 2017

RedSeal CEO Ray Rothrock to Lead Cybersecurity Panel at Milken Institute Global Conference

April 30, 2017 03:35 AM - Marketwire - Networking -- Rothrock and Cybersecurity Experts to Discuss the Value of a Digital Resilience Strategy to Combat Cyber Attacks

IBM Opens Four New Cloud Data Centers in the United States to Support Growing Demand for Cognitive Capabilities

April 30, 2017 03:01 AM - PR Newswire: Computer Software -- IBM (NYSE: IBM) today announced the opening of four new IBM Cloud data centers in the United States to support growing enterprise demand for...

IBM Named a Leader for its Security Solution in Gartner Magic Quadrant for Application Security Testing

April 30, 2017 02:56 AM - PR Newswire: Business Technology -- IBM (NYSE: IBM) today announced that Gartner, Inc. has named IBM as a leader in Application Security Testing (AST) in the recently published...

IBM X-Force: Financial Services Most Targeted By Cybercriminals in 2016

April 30, 2017 02:50 AM - PR Newswire: Business Technology -- IBM (NYSE: IBM) Security today announced research from its IBM X-Force Research team which revealed the financial services industry was attacked...

SnoopWall CEO, a Breach Prevention Expert, to Keynote NAB Conference's Cybersecurity Pavilion

April 30, 2017 02:42 AM - PR Newswire: Business Technology -- SnoopWall, Inc., the global leader in breach prevention, is announcing the Keynote speech of the company's CEO, Gary Miliefsky, a world-renowned...

Security Pros Reveal Hacker Secrets and Five Security Mistakes to Avoid

April 30, 2017 02:38 AM - PR Newswire: High Tech Security -- Delta Risk LLC, a global provider of cyber security and risk management services, announced today that it will host a webinar on "Hacker Secrets...

GRIMM to Roll Out Michigan Car-Hacking Lab Following SANS Automotive Cybersecurity Summit

April 30, 2017 02:37 AM - PR Newswire: High Tech Security -- GRIMM, a leader in security engineering, is ramping up its Michigan team as the automotive industry continues to seek security help.

Automobiles...

Easy Solutions Helps Foster a Safer Internet, Takes Swordphish Live

April 30, 2017 02:26 AM - Business Wire: Internet -- Easy Solutions announced today that Swordphish, its predictive risk technology, is now generally available to organizations looking...

AICPA Unveils Cybersecurity Risk Management Reporting Framework

April 30, 2017 02:26 AM - Business Wire: Internet -- The American Institute of CPAs has introduced a market-driven, flexible and voluntary cybersecurity risk management reporting framework.

Centrify Warns Password Vaults Alone Not Enough to Stop Data Breaches

April 30, 2017 02:15 AM - Business Wire: Software -- Centrify today announced significant enhancements to its best-in-class privileged identity management (PIM) solution to stop breaches that abuse...

McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations

April 30, 2017 02:15 AM - Business Wire: Software -- A few weeks after launching as a standalone company, McAfee LLC, the globally trusted security provider, today announced it will...

Here's an IRS Contract With a Dark Web Intel Firm

April 30, 2017 01:39 AM - Motherboard -- The Internal Revenue Service paid Flashpoint $65,000.

New Mac malware has an evil way of taking over your entire computer

April 30, 2017 12:27 AM - BGR -- It used to be that Mac users didn't really have to worry about malware. But we live in a brave new world with easy internet access and a bunch...

April 29, 2017

Sadly, laptops stolen from cars are still a thing

April 29, 2017 11:44 PM - InfoSec.Buzz - Information Security Buzz -- Office of Inadequate Security - From a notification filed on behalf of Donaldson Company, Inc.: On March 24, 2017, a Donaldson employee's company-issued,...

Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking

April 29, 2017 11:43 PM - InfoSec.Buzz - Information Security Buzz -- The Hacker News - A team of researchers from the University of Michigan discovered that hundreds of applications in Google Play Store have a...

Cloudflare Nukes IoT Security Threats from 'Orbit'

April 29, 2017 11:43 PM - InfoSec.Buzz - Information Security Buzz -- eSecurityPlanet - The company's new service keeps IoT devices, even ones riddled with vulnerabilities, out of a hacker's grasp.

New OSX.Dok malware intercepts web traffic

April 29, 2017 11:42 PM - InfoSec.Buzz - Information Security Buzz -- Malwarebytes Unpacked - Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece...

Best Practices for Implementing Access Control Systems

April 29, 2017 11:41 PM - InfoSec.Buzz - Information Security Buzz -- InfoSecWriters.com - Contributed by Isaac McGuire

As a network administrator or information security specialist, you might find yourself wondering...

A Day in the Life of a Security Avenger

April 29, 2017 11:41 PM - InfoSec.Buzz - Information Security Buzz -- Dark Reading - Behind the scenes with a security researcher as we follow her through a typical day defending the world against seeming boundless...

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

April 29, 2017 11:40 PM - InfoSec.Buzz - Information Security Buzz -- eSecurityPlanet - SIEM tools monitor network logs to detect security threats and prevent breaches. Our guide offers everything you need to know...

Error causes Webroot antivirus software to quarantine key programs, including Windows

April 29, 2017 10:40 PM - Denver Post -- A Webroot security update disabling core programs including Microsoft Windows was still causing headaches Tuesday for the Broomfield-based cybersecurity...

April 28, 2017

Cryptology for Business and Organizations on the 21st century

April 28, 2017 07:23 PM - InfoSec.Buzz - Information Security Buzz -- Security Affairs - Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and...

Kali Linux 2017.1 is arrived, more power for password-cracking with cloud GPUs

April 28, 2017 07:21 PM - InfoSec.Buzz - Information Security Buzz -- Security Affairs - Kali Linux 2017.1 rolling release was announced, the popular distro comes with a set of significant updates and features.

The...

StringBleed SNMP Authentication Bypass affects numerous devices online

April 28, 2017 07:20 PM - InfoSec.Buzz - Information Security Buzz -- Security Affairs - Security researchers discovered an SNMP flaw dubbed StringBleed that affects several models of Internet-connected devices.

Simple...

Is cybersecurity now as important as health and safety?

April 28, 2017 07:20 PM - InfoSec.Buzz - Information Security Buzz -- WeLiveSecurity - World Day for Safety and Health at Work takes place on April 28th 2017. You should use this as an opportunity to improve your...

What Makes Passwords Secure?

April 28, 2017 07:19 PM - InfoSec.Buzz - Information Security Buzz -- TripWire - The State of Security - On average, each person has 27 online logins and passwords. They protect our bank accounts, our social media,...

9 security tools for the mobile worker

April 28, 2017 07:18 PM - InfoSec.Buzz - Information Security Buzz -- CSO Online - Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we...

State-of-the-art multifactor authentication (MFA) technologies

April 28, 2017 07:18 PM - InfoSec.Buzz - Information Security Buzz -- CSO Online - Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with...

Microsoft App Aims to Delete the Password

April 28, 2017 07:16 PM - InfoSec.Buzz - Information Security Buzz -- Dark Reading - Microsoft has officially launched its Authenticator app designed to simplify and secure user logins, raising questions about the...

Report: Top 25 IT security products

April 28, 2017 07:15 PM - InfoSec.Buzz - Information Security Buzz -- CSO Online - Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station,...

We Can't Control Devices and People, but We Can Control the Network

April 28, 2017 07:15 PM - InfoSec.Buzz - Information Security Buzz -- Infosec Island - For decades, consultants and federal systems integrators have served as a bridge between Silicon Valley and the U.S. Federal...

Hacking Back - Offense/Defense in Enterprise IT Security

April 28, 2017 07:02 PM - InfoSec.Buzz - Information Security Buzz -- InfoSecWriters.com - One of the many thoughts that travel through the minds of the computer user are these questions,...

Five ways the U.S. is educating cybersecurity talent - and what's still missing

April 28, 2017 07:01 PM - InfoSec.Buzz - Information Security Buzz -- CSO Online - It's no secret that the world is facing a shortage of cybersecurity talent. The (ISC)2 Center for Cyber Safety and Education's 2017...

More LastPass flaws: researcher pokes holes in 2FA

April 28, 2017 06:58 PM - InfoSec.Buzz - Information Security Buzz -- Naked Security - LastPass has been in the news again for another chink in its armour - though it has now been fixed, you'll be glad to hear

Open source security risks persist in commercial software [Infographic]

April 28, 2017 06:56 PM - InfoSec.Buzz - Information Security Buzz -- CSO Online - Whatever commercial software your company uses, it probably contains open source code. Black Duck Software recently completed its...

Making Sense of the General Data Protection Regulation (GDPR)

April 28, 2017 06:55 PM - InfoSec.Buzz - Information Security Buzz -- TripWire - The State of Security - The upcoming GDPR compliance deadline of May 2018 affects any organization across the world that collects,...

Why (& How) CISOs Should Talk to Company Boards

April 28, 2017 06:54 PM - InfoSec.Buzz - Information Security Buzz -- Dark Reading - The C-Suite needs to minimize cybersecurity risk in order to maximize its principal goal of attaining high-level, sustainable...

Advances in Ad Blocking

April 28, 2017 06:54 PM - InfoSec.Buzz - Information Security Buzz -- Schneier on Security - Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and...

How to fight security fatigue

April 28, 2017 06:53 PM - InfoSec.Buzz - Information Security Buzz -- Malwarebytes Unpacked - We live in the age of the 24-hour news cycle. Each day, whether it's from TV news, phone notifications, online browsing,...

Customer Tip: Enrolling In DynID

April 28, 2017 06:46 PM - InfoSec.Buzz - Information Security Buzz -- Dyn - It's time to acquire an ID that you don't need to carry in your wallet. While your DynID won't let you drive a car, board a plane, or order...

Faking Domain Names with Unicode Characters

April 28, 2017 06:38 PM - InfoSec.Buzz - Information Security Buzz -- Schneier on Security - It's things like this that make phishing attacks easier.

Atlassian's HipChat hacked, user data and private messages compromised

April 28, 2017 06:38 PM - InfoSec.Buzz - Information Security Buzz -- The Hacker News - Atlassian's group chat platform HipChat is notifying its users of a data breach after some unknown hacker or group of hackers...

Securing Docker, One Patch at a Time

April 28, 2017 06:35 PM - InfoSec.Buzz - Information Security Buzz -- eSecurityPlanet - The open-source Docker container project integrates many different security approaches, but like every other software project,...

72% of Employees Would Share Confidential Company Information, Finds Survey

April 28, 2017 06:32 PM - InfoSec.Buzz - Information Security Buzz -- TripWire - The State of Security - A new survey found that nearly three in four employees would be willing to share sensitive, confidential or...

The Road Less Traveled: Building a Career in Cyberthreat Intelligence

April 28, 2017 06:32 PM - InfoSec.Buzz - Information Security Buzz -- Dark Reading - It's hard to become a threat intelligence pro, but there are three primary ways of going about it.

BGP Hijacking and Mitigation Techniques

April 28, 2017 06:31 PM - InfoSec.Buzz - Information Security Buzz -- InfoSecWriters.com - Contributed by Christian Matlock

Due to the nature of how BGP operates and how it was designed, a series of both unintentional...

Almost 40 Percent of Industrial Computers Were Hit by Cyber Attacks in 2H 2016

April 28, 2017 06:31 PM - InfoSec.Buzz - Information Security Buzz -- eSecurityPlanet - And a quarter of all targeted attacks were aimed at industrial targets, a recent study found.

Ransomware hidden inside a Word document that's hidden inside a PDF

April 28, 2017 06:31 PM - InfoSec.Buzz - Information Security Buzz -- Naked Security - Spam campaign delivers Locky ransomware that, like a Russian matryoshka doll, is nested inside not one but two layers

CloudFlare Alternatives - Incapsula vs Sucuri vs StackPath

April 28, 2017 05:46 PM - Stratusly -- Next generation cloud security companies like CloudFlare have made it easy for anyone with minimal technical abilities to secure and accelerate...

Bookmark and Share

Last updated (UTC):
April 30, 2017 02:36 AM

If you have any questions about this site, please contact me -