Security Awareness

Security Awareness news, information, and how-to advice

black hat 2015
2015 CyberPatriot Awards

information security keyboard

How CISOs can beat the information security skills-gap

The information security skills gap may have become a huge issue for Chief Security Offices (CSOs) and Chief Information Security Officers (CISOs), but there are a number of ways infosec teams can work around the shortage so to...

doctor tablet

Study: 81% of large health care organizations breached

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG

Intel's new power-efficient graphics core

Intel says GPU malware is no reason to panic, yet

Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.

keychain access icon

Researchers discover new keychain vulnerability in OSX

Antoine Vincent Jebara and Raja Rahbani, the co-founder and lead engineer of MyKi – an identity management company in Beirut - have discovered a vulnerability in Apple's password management system (Keychain), which if exploited,...

cyberinsurance thinkstock

Cybercrime by wire fraud – what’s covered?

Perhaps the only thing worse than falling victim to a business email compromise or “CEO fraud” that results in millions of dollars in wire fraud theft – is wondering whether your insurance will cover any of the loss.

boardroom

Do boards of directors actually care about cybersecurity?

There’s no shortage of arguments that cybersecurity needs to be aligned with the needs of the business, or that security is now a “boardroom issue.” And it seems that a new report or study is issued every day that states that boards...

Security (3)

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick

Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure.

security little league world series

Behind the scenes: Security operations at the Little League World Series

Each year in late August, the Little League World Series (LLWS) in South Williamsport, Pa., kicks-off. However, before the games, there’s a ramp –up on security at the Little League Baseball World Series Complex, which requires months...

fbi seal

FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until August 2015 are added up.

NSA headquarters.

NSA bulk call records collection extended for last time

The U.S. National Security Agency's controversial program for the bulk collection of domestic call records has been granted extension for the last time, according to documents released.

isis flag graphic

Teen jailed for supporting ISIS on Twitter

A 17-year-old Virginia resident has been sentenced to more than 11 years in prison, after he used Twitter to provide financial and recruiting support to the extremist Islamic group known as ISIS.

culture

Cyber security culture is a collective effort

Many believe that cyber security culture starts from the top and works its way down. While there is merit to this statement, I would argue that all stakeholders in the ecosystem create cultures collectively.

business video ts

The incident response plan you never knew you had

By leveraging important elements of the existing business continuity plan (BCP) and resources, the security team can jump start the computer incident response plan (CIRP) and obtain a faster and more responsive organization.

isis flag graphic

Reports: Ex-TeaMp0isoN member killed in Syrian drone strike

A British hacker, and former member of the hacking group TeaMp0isoN, Junaid Hussain (TriCk), was killed in a drone strike outside of the Syrian city of Raqqa on Tuesday. Reports of his death started circulating Wednesday afternoon as...

Board Room

When to throttle yourself as a new CISO

Surviving the C-Suite as a CISO

Phishing key

Phishing is a $3.7-million annual cost for average large company

The average 10,000-employee company spends $3.7 million a year on dealing with phishing attacks, according to a new report from the Ponemon Institute

too close darwin award

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little additional cost by paying extra attention to these users.

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

Load More