Gap in cybersecurity knowledge creates challenges for organizations

Gap in cybersecurity knowledge creates challenges for organizations

Survey from the Ponemon Institute and Fidelis Cybersecurity shows limited cybersecurity knowledge of board members impacts trust and affects the overall security posture for organizations.

06/23/15

Are commercial planes in danger of being hacked?

Are commercial planes in danger of being hacked?

The information security community weighs in on the possibility that a commercial plane can be hacked through the passenger-facing entertainment network.

05/18/15

Citrix Workspace Cloud lets users be productive and secure from virtually anywhere

Citrix Workspace Cloud lets users be productive and secure from virtually anywhere

At Citrix Synergy this week Citrix unveiled the new Workspace Cloud platform that enables customers to manage and deliver workspace services from a cloud-based control plane.

05/13/15

HackerOne research examines market dynamics of zero day vulnerabilities

HackerOne research examines market dynamics of zero day vulnerabilities

Katie Moussouris teamed up with MIT and Harvard researchers to explore the financial incentives and market dynamics that drive vulnerability disclosure.

04/15/15

Dabbling in two-factor authentication can be dangerous

Dabbling in two-factor authentication can be dangerous

Selectively implementing two-factor authentication doesn't provide comprehensive protection and can give organizations a false sense of security.

04/13/15

Cyber threat intelligence is crucial for effective defense

Cyber threat intelligence is crucial for effective defense

A new Ponemon report commissioned by Webroot underscores the importance of threat intelligence in developing a strong security posture.

04/02/15

Barracuda adds Android support in MDM platform

Barracuda adds Android support in MDM platform

Barracuda’s cloud-based mobile device and application management service now includes support for Android mobile devices.

03/30/15

Box offers customers better data protection with Enterprise Key Management

Box offers customers better data protection with Enterprise Key Management

Box rolled out EKM (Enterprise Key Management) this week to enable business customers to control and manage their own encryption keys.

02/13/15

Make sure your company isn’t the next Anthem

Make sure your company isn’t the next Anthem

Security experts weigh in on the massive data breach of Anthem, and offer advice to make sure your company isn’t compromised as well.

02/06/15

CrowdStrike demonstrates how attackers wiped the data from the machines at Sony

CrowdStrike demonstrates how attackers wiped the data from the machines at Sony

CrowdStrike CTO Dmitir Alperovitch talks about how attackers were able to bring Sony to its knees, and what you need to do to defend against similar attacks.

02/04/15

Most APTs are not so ‘sophisticated’ after all

Most APTs are not so ‘sophisticated’ after all

A new report from Sophos reveals that many advanced persistent threats rely on packaged malware distributed by attackers with little skill.

02/03/15

Make sure ex-employees don’t walk out the door with your data

Make sure ex-employees don’t walk out the door with your data

Whether employees leave on good or bad terms, when someone is terminated from the company you need to make sure they aren’t taking sensitive information with them.

01/29/15

Report: Organizations concerned about risk from insider attacks

Report: Organizations concerned about risk from insider attacks

A report from Vormetric found that nearly 90 percent of organizations are more at risk from an insider attack.

01/27/15

5 things you can do to limit your exposure to insider threats

5 things you can do to limit your exposure to insider threats

Despite the evolution of sophisticated attacks from outside hackers, insiders remain a primary threat and organizations need to take precautions to minimize the risk.

01/26/15

Insecure Snapshot dongle puts 2 million cars at risk

Insecure Snapshot dongle puts 2 million cars at risk

A security researcher discovered that the Snapshot dongle from Progressive Insurance can be exploited to enable a hacker to access critical vehicle controls.

01/20/15

Worst cyber attacks of 2014 could (should) have been avoided

Worst cyber attacks of 2014 could (should) have been avoided

Report from CyActive finds that the many of the most damaging cyber attacks of 2014 relied on recycled and re-used malware components that should have been detected.

01/19/15

Location tracking in mobile apps is putting users at risk

Location tracking in mobile apps is putting users at risk

Synack researchers are scheduled to present this weekend at Shmoocon about the insecurity of location tracking in mobile apps.

01/16/15

60 percent of Android devices left vulnerable to security risk

60 percent of Android devices left vulnerable to security risk

Google confirmed it has no plans to patch or update WebView on Android 4.3 or earlier—leaving 60 percent of Android devices vulnerable.

01/13/15

RedStar OS reveals all of North Korea is one giant intranet

RedStar OS reveals all of North Korea is one giant intranet

White Hat Security’s Robert Hansen discovered that the entire country of North Korea is essentially an intranet, sharing a non-routable address space.

01/10/15

Gogo abuses certificate trust to limit access for in-flight Wi-Fi customers

After being called out by a Google engineer, Gogo issued a statement admitting that it uses man-in-the-middle attacks to block access to certain websites.

01/06/15

Load More