Business Continuity

Business Continuity news, information, and how-to advice

binary hard drive

Why our lack of understanding on China may be the biggest risk

While China’s ability to wage cyber warfare is sure, the real risk to the U.S. may be its lack of understanding the eastern nation. ...


vibrams

Vibram suffered five finger data breach

Vibrams hosting provider hacked. ...

erp

ERP: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners in order to target chain resources. So what can organizations do about this type of threat, when they're...

blackhat2013

Black Hat 2014: The challenge of securing embedded devices and IoT on display

Industry doesn’t yet fully realize extent of subversion possible through IoT security, researchers say....

blackhatlogo

Salted Hash: Live from Black Hat USA (Day 0)

Salted Hash is on the road this week. All week long, the blog will be updated with news, and various tidbits from Black Hat USA, B-Sides Las Vegas, and DEF CON 22....

Are you immune from this very real risk to your tenure as CSO?

As we work to adjust our bias for breach prevention, the real concern is how the response is handled. Some steps to help ensure you get it right. ...

credit card reader

Nearly 600 business impacted by POS malware attack

The United States Secret Service, working with Trustwave, has discovered a series of attacks in the retail sector, which uses customized malware to infect POS systems. The crime itself isn't overly technical, as the criminals behind...

steel chain with broken link close up 55909938

Insecure Connections: Enterprises hacked after neglecting third-party risks

Third-party security is continuously lacking, yet few leaders show concern or take action...

Are you prepared to address the security impact of aging coders on key systems?

Recognizing the impact of aging coders on the security of key systems is not yet a priority. Which is precisely why it’s important. Here are some considerations. ...

Security must evolve to be ‘all about the data’

Experts on panel discussion sponsored by Dell agree that the current security model is obsolete, and that to face the expanding and evolving threat landscape will require embedding data itself with smart security protection...

goodwill industries thrift shop canton michigan

A possible breach at Goodwill is bad, but nothing special

Last week, Goodwill Industries International was alerted by federal authorities to a possible payment card breach at several of their U.S. locations. Reaction to this news has been typical for the most part, as they're yet another...

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

knowledge is power 149148084

Misconceptions about targeted attacks

Trend Micro's Spencer Hsieh published a blog recently that caught my attention. It's focused on misconceptions surrounding targeted attacks. It's an interesting read, which I thought was worth sharing on Salted Hash....

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

credit card processing

Cybersecurity fears drive SMBs to third-party payment services

High-profile breaches highlight the need for secure credit card processing....

Want credit for June's Exchange blackout? File a claim

Affected Office 365 and Exchange Online customers may be eligible for 25 percent service credit...

internet gavel keyboard

Takedown of No-IP by Microsoft impacts 1.8M customers

New details have emerged in the aftermath of Microsoft's actions against Vitalwerks - the company that operates No-IP (noip.com). At current count, 1,832,133 customers were impacted by Microsoft's takedown of No-IP, which directly...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

butlerbulldog

Butler University data breach impacts 163,000

Indianapolis-based Butler University has warned more than 160,000 students, alumni, faculty, staff, and past applicants that their personal information was exposed during a data breach in 2013....

Load More