ITSM – The best cost effective solution for Better Service
A Gartner study reads, “By 2019, IT service desks utilizing machine learning enhanced technologies will free up to 30% of support capacity.” A ti...
Friday Squid Blogging: The Symbiotic Relationship Between...
This is the story of the Hawaiian bobtail squid and Vibrio fischeri. As usual, you can also use this squid post to talk about the security stories in the new...
Drupal Patches Critical Bug That Leaves Platform Open to ...
Drupal has patched several vulnerabilities – both moderately critical and critical – in two versions of its content management system platform.
93% of Cloud Applications Aren't Enterprise-Ready
The average business uses 1,181 cloud services, and most don't meet all recommended security requirements, Netskope says.
'OMG': New Mirai Variant Converts IoT Devices into Proxy ...
The new malware also can turn bots into DDoS attack machines, says Fortinet.
ISO 27001 & cybersecurity training and qualifications: No...
Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and...
Which phishing messages have a near 100% click rate?
Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rate...
FBI Warns of Spike in W-2 Phishing Campaigns
A recent FBI public service advisory warned of an increase in reports of compromised or spoofed emails involving W-2 forms.
Right Blasts Twitter's Bot Takedown
Conservatives on Twitter have been fulminating over their losses of followers measured in the thousands, a consequence of the network's unannounced lockout e...
10 Can't-Miss Talks at Black Hat Asia
With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security expert...
IDG Contributor Network: Automation is the key to mitigat...
I recently ran across an article titled “Cisco Report Finds Organizations Relying on Automated Cyber-Security.” It got me thinking about what we are doing th...
Visa: EMV Cards Drove 70% Decline in Fraud
Merchants who adopted chip technology saw a sharp decline in counterfeit fraud between 2015 and 2017, Visa reports.
Public Sector Cybersecurity Weekly Briefing 02-23-2018
[INFOGRAPHIC] Inside the Mind of a Threat Actor: Tactics, Techniques, and Procedures Explained They lure their victims with the bait of a seemingly innocent ...
A New Lobbying Group is fighting Right to Repair Laws
Consumer advocates and proponents of right to repair laws in 17 states have a new enemy to worry about. The Security Innovation Center, with backing of power...
Updated: A New Lobbying Group is fighting Right to Repair...
Consumer advocates and proponents of right to repair laws in 17 states have a new enemy to worry about. The Security Innovation Center, with backing of power...
Healthcare Cybersecurity Weekly Briefing 02-23-2018
[INFOGRAPHIC] Inside the Mind of a Threat Actor: Tactics, Techniques, and Procedures Explained They lure their victims with the bait of a seemingly innocent ...
Financial Services Cybersecurity Weekly Briefing 02-23-2018
[INFOGRAPHIC] Inside the Mind of a Threat Actor: Tactics, Techniques, and Procedures Explained They lure their victims with the bait of a seemingly innocent ...
Leveraging Security to Enable Your Business
When done right, security doesn't have to be the barrier to employee productivity that many have come to expect. Here's how.
IT Security News Blast 02-23-2018
The Top 5 Financial Markets That Are Open To Attack Cyber security now has to be among the considerations for investors. When people pore over a […]
Military, FBI, And ICE Are Customers Of Controversial Sta...
Drupal Patches Critical CMS Vulnerabilities
OpenBSD Releases Meltdown Patch
uTorrent Users Urged To Upgrade To Mitigate Hijacking Flaw
Mr. Robot Remains Only Show Delivering Cantennas And Card...
Armed Officer Waited Outside During Florida High School S...
​​An armed deputy stationed at Marjory Stoneman Douglas High waited outside as a gunman opened fired inside, U.S. President Donald Trump suggests arming teac...
IDG Contributor Network: The wild west of cryptocurrency ...
There’s no question that virtual currencies are destined to become mainstream, given the market’s already astounding exponential growth; in 2017 alone, the v...
Enabling Better Risk Mitigation with Threat Intelligence
In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here's how.
Supporters of Net Neutrality Vow to Fight Rule Changes
The FCC’s rollback of network neutrality regulations is set to be complete in April, but it won't happen without a fight.
The economic impact of cybercrime? Almost $600 billion
Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, ...
Counterfeit digital certificates for sale on underground ...
Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antiv...
IDG Contributor Network: The time is now for a comprehens...
As one who attends many industry conferences, it’s almost a guarantee that you will hear the cliché question “What issue keeps you up at night?” posed to ent...
IDG Contributor Network: GDPR is not just a regulatory fr...
This is not “yet another” article spooking you with the eye popping “Fines of up to 4% of revenue or 20 million Euros for failure to meet GDPR regulations.” ...
New infosec products of the week​: February 23, 2018
Cisco offers cloud-based endpoint security solutions for MSSPs Cisco is offering MSSPs security, visibility, and control of customer endpoints. Their endpoin...
Poor smart contract coding exposes millions of dollars in...
Researchers have discovered over 30,000 contracts are open to exploit.
IDG Contributor Network: Take a cue from Europe on making...
In the U.S. we’re all about the customer. How fast can I get that Amazon delivery to your door? How much better can I make that latte you buy every week? How...
Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attac...
Election Security
I joined a letter supporting the Secure Elections Act (S. 2261): The Secure Elections Act strikes a careful balance between state and federal action to secur...
Drupal patches critical CMS vulnerabilities
The bugs include incorrect code handling and access bypass security flaws.
Drupal patches critical CMS vulnerabilities
The bugs include incorrect code handling and access bypass security flaws.
Six tips to help you avoid targeted marketing
If you get sick of shopping sites sending you “I see you stared at this item, here’s some similar stuff” messages, you may be able to modify your subscriptio...
Unified Endpoint Management: Why a UEM Solution Is a Comp...
Cloud computing, mobile devices and the Internet of Things (IoT) are dramatically enlarging the attack surface of modern organizations. This makes it more di...
Discover Silent Identity and Access Management
There’s no doubt that today’s identity and access management (IAM) programs are under pressure. Invisible forces both inside and outside the enterprise, such...
Understanding and Neutralizing Evasive Malware Tactics
Chasing malware developers through their cyber rabbit holes might be a fun challenge for security researchers, but for the rest of us, the effectiveness of m...
Secrets at Risk as DevOps Goes Mainstream
As DevOps becomes established across industries and geographies, the way in which we deliver applications and services for businesses continues to evolve and...
Trend Micro fixes serious vulnerabilities in Email Encryp...
Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the pers...
Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure.The single most...
The economic impact of cybercrime? Almost $600 billion
Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, ...
Cisco warns of Internet of Things, Supply Chain Risk
Cisco Systems warned that companies need to do a better job monitoring IoT devices and third party software providers, as Internet of Things based botnets an...
Best Practices for Recruiting and Retaining Women in Secu...
Gender diversity can help fill the security talent gap, new Forrester Research report says.
Best Practices for Recruiting & Retaining Women in Security
Gender diversity can help fill the security talent gap, new Forrester Research report says.
Powered by Feed Informer