-
Cybersecurity legislation mired as executive order looms
Internet Security Alliance President Larry Clinton sees little hope that Congress would act on legislation aimed at bolstering cybersecurity lapses.30 Oct 2012
-
DDoS, SQL injection discussions trending in hacking forums, study finds
Hackers share attack techniques and vulnerability information, shedding light on what threats matter most, according to a new study.30 Oct 2012
-
Howard Schmidt warns private sector of cyberwar impact
Establishing clear rules of engagement, improving public/private sector security collaboration among priorities ahead, former cybersecurity Czar said.29 Oct 2012
-
State CISOs cite insufficient funding, lack of skilled IT professionals in survey
The biannual Deloitte-NASCIO survey revealed what state CISOs believe are the top barriers in addressing cybersecurity.29 Oct 2012
-
South Carolina breach affects millions
Millions of Social Security numbers and thousands of credit and debit cards were exposed after an attacker penetrated a state agency server.29 Oct 2012
-
How to use Wireshark to detect and prevent ARP spoofing
Video: Keith Barker of CBT Nuggets demonstrates how to use Wireshark, the popular open source packet analyzer, to prevent ARP spoofing attacks.29 Oct 2012
-
Debating international cyberespionage, poor secure coding practices
Corey Schou explains why cyberespionage and corporate intelligence are linked; also, why attackers aren't to blame for insecure coding practices.26 Oct 2012
-
(ISC)2's Schou on board member responsibilities, limitations
Co-founder Corey Schou says (ISC)2 board member responsibilities include managing growth, certification value and building a "member-centric" culture.25 Oct 2012
-
Report details insider threats, but enterprises can respond, says expert
Scott Crawford, a research director at Enterprise Management Associates, explains how some enterprises address the risk of a trusted insider turned rogue.24 Oct 2012
-
Metasploit Review: Ten Years Later, Are We Any More Secure?
Some say the pen testing framework is a critical tool for improving enterprise security, while others say it helps attackers.24 Oct 2012
-
The new era of big data security analytics
The information security industry needs to shift its focus to data-driven security.24 Oct 2012
-
FISMA Compliance and the Evolution to Continuous Monitoring
The U.S. Department of State developed a system for improving federal cybersecurity.24 Oct 2012
-
Security Risk Assessment Process a Team Effort at Notre Dame
The university created a committee to tackle risk assessment on an ongoing basis.24 Oct 2012
-
GRC Management and Critical Infrastructure Protection
GRC needs to adapt to become a truly effective risk management tool for critical infrastructure.24 Oct 2012
-
Security Warrior for Cloud Transparency
Ron Knode, who passed away earlier this year, was a tireless advocate for cloud security transparency.24 Oct 2012
-
Developing a BYOD Strategy: Weigh the Risks, Challenges and Benefits
Organizations need to consider benefits and risks as they embrace BYOD.24 Oct 2012
-
Verizon DBIR: Identify insider threat warning signs, safeguard IP
Trusted insiders often play a role in IP theft, according to a new report. Spot the warning signs and apply the right data protection, say experts.24 Oct 2012
-
Information Security Decisions: From Dogma to Data
The information security field needs to overcome information sharing roadblocks to improve decision making.24 Oct 2012
-
Verizon DBIR analysis finds intellectual property theft takes years to detect
Intellectual property theft often involves collusion between attackers and malicious insiders, according to a study of 85 breaches conducted by Verizon.23 Oct 2012
-
Marcus Ranum chat: Next-generation SIEM
Security expert Marcus Ranum goes one-on-one with Gartner’s Anton Chuvakin about SIEM technology and where it’s headed.23 Oct 2012
Security Management Strategies for the CIO