New Survey: 70% Of Orgs Don’t Take Data Protection Seriously
Majority of organizations in this study are failing to comply with SOX, others, Varonis study shows
View ArticleFriday Five – The Father of the Internet and the City with the Most Stolen...
RSA Conference Friday Five – April 20, 2012 This week’s Friday Five has a must read article featuring the father of the Internet and how he’s working to protect our privacy. Tim Berners-Lee’s thoughts...
View ArticleWordPress Security Release – Upgrade to 3.3.2 TODAY
Its that time again, to upgrade all your WordPress installs. This morning the core team released WordPress 3.3.2 which includes security updates for three external libraries: Plupload (version 1.5.4),...
View ArticleWeekly News Roundup
Happy Friday readers! There was certainly no shortage in security news this week, here are our picks for the top headlines: Mac OS X Malware: “Mac OS X Pummeled By Yet Another Trojan” by Stefanie...
View ArticleThe StillSecure Security Summit
These days, no matter where you look, you can find a number of articles highlighting the benefits and issues surrounding cloud security. For many of us, the amount of coverage has become more than a...
View ArticleFormula 1 website attacked by Anonymous, brought down by DDoS
Anonymous hacktivists appear to have successfully blasted the Formula 1 website off the net, with a distributed denial-of-service (DDoS) attack.
View ArticleAT&T Wireless Bill Turned Malicious
Everyone dreads paying their wireless bill, but imagine getting a wireless bill for over $1600 dollars! This latest threat does just that, sending you a wireless bill for an exorbitant amount pushing...
View ArticleSome News About HiTB Amsterdam
Some news about the upcoming edition of the “Hack in The Box” security conference. This third edition (already!) will be held at a new venue: The hotel Okura in the center of Amsterdam. Apart of...
View ArticleTrust in Computing Research : 3 : Computing and the Internet (Geographic...
In the first part of the series , we looked specifically at the general use of Computing and the Internet, with the second part focusing on the audience breakdown for these questions. While some of the...
View ArticleWatching the Watchers: Integration
As we wrap up the Watching the Watchers series, it’s good to remind ourselves of the reality of enterprise security today. Basically nothing stands alone, not in the enterprise management stack...
View ArticleHack Naked TV Episode 32
In this episode we talk about more OS X Malware. More! We also discus POS trojans. Links for this episode: Yet another Mac Trojan Yet another Hotel Trojan Links to cool stuff our awesome sponsors are...
View ArticleZero Trust Identity: Go From "Identity-As-A-Service" To "IAM-As-An-API"
App dev trends around the open Web are throwing a lifeline to IAM. The trick is to think in resource-centric,unified, and Internet-scale terms. read more
View ArticleThanks @IOActive for sponsoring the #ISSA UK activity during #InfoSec Europe!…
Thanks @IOActive for sponsoring the #ISSA UK activity during #InfoSec Europe! Your support is much appreciated by the association!
View ArticleSBN Sponsor Post
See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR
View ArticleToday’s Threats: Less Generalized, More Dangerous
Yesterday, HP Enterprise Security Products released our "2011 Top Cyber Security Risks" report. A joint offering from the security research labs feuling HP Enterprise Security, the report examines...
View ArticleSleep and the 25% breached
CDW has published a Data Loss Straw Poll with the headline "One in four organizations has experienced a data loss in the last two years." CDW’s Data Loss Straw Poll surveyed 654 IT professionals from...
View ArticleTWSL2012-012: Cross-Site Scripting Vulnerability in Support Incident Tracker
Trustwave SpiderLabs has published a new advisory today for a reflective Cross-Site Scripting finding in the Support Incident Tracker (or SiT!). Currently, Support Incident Tracker version 3.65 and...
View ArticleWhen Youre A UTM Everything Looks Like A Nail
I have written about Richard Stiennon’s view of UTM’s as a Godbox before. I don’t blame Richard for advocating and thinking that UTM’s really do everything they advertise themselves as doing and even...
View Article