• May 13, 2016 13 May'16

    Google insider data breach exposed employee personal info

    Roundup: Google experiences an insider data breach, but the data leakage is cleaned up by a conscientious benefits manager. Plus, the FDIC reports five 'major' incidents, and more.

  • May 13, 2016 13 May'16

    DHS warns on actively exploited SAP Java vulnerability

    DHS US-CERT warns of a patched SAP Java vulnerability from 2010 that has enabled breaches at three dozen global enterprises due to configuration issues.

  • May 12, 2016 12 May'16

    Senate asks President Obama for a cyber act-of-war definition

    A new bill from the Senate asked President Obama for a cyber act-of-war definition in order to enable a proper response following a cyberattack.

  • May 12, 2016 12 May'16

    EU regulatory critics, Rule 41 pose threat to Privacy Shield

    The new Privacy Shield framework for transatlantic data flows faces challenges from Article 29 Working Party criticism, as well as U.S. changes to Rule 41 for computer searches.

  • May 11, 2016 11 May'16

    Ransomware warning issued to Congress following attack

    Representatives in Congress have received a ransomware warning following an increased number of attacks perpetrated via phishing schemes.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • May 10, 2016 10 May'16

    May 2016 Patch Tuesday: IE zero-day patch tops the list

    Microsoft's May 2016 Patch Tuesday takes aim at an IE zero-day vulnerability, which experts say is the top priority, as well as a couple server-side flaws to keep an eye on.

  • May 10, 2016 10 May'16

    U.S. intelligence agencies cut off from Twitter firehose

    Twitter ordered its business partner Dataminr to cut off the Twitter firehose feed access for U.S. intelligence agencies, but experts expect the NSA won't miss much.

  • May 06, 2016 06 May'16

    Commercial code riddled with open source vulnerabilities

    Roundup: Customers, vendors both unaware of unpatched open source vulnerabilities in commercial software. Plus OpenSSL patches, warrantless wiretaps and more.

  • May 05, 2016 05 May'16

    DARPA to build a cyber attribution system to ID criminals

    DARPA has decided to take on one of the most difficult tasks in cybersecurity -- building a cyber attribution system to be able to identify attackers and maybe prevent attacks.

  • May 03, 2016 03 May'16

    Craig Wright fails, again, to prove he's the bitcoin creator

    Craig Wright's second attempt to prove he's the bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.

  • April 29, 2016 29 Apr'16

    Apple/FBI battle continues over iPhone vulnerabilities

    More fallout from the Apple/FBI conflict: The second iPhone suit was dropped; the FBI can't provide details of a tool used to unlock the San Bernardino shooter's phone.

  • April 28, 2016 28 Apr'16

    PCI DSS 3.2 focuses on encryption and multifactor authentication

    PCI DSS 3.2 marks the start of refining the payment data regulations, rather than minor changes, and includes requirements to strengthen encryption and multifactor authentication.

  • April 26, 2016 26 Apr'16

    Verizon DBIR 2016 shows we haven't learned how to improve security

    The 2016 Verizon DBIR skimps on data breach analysis and instead focuses on common issues, such as phishing, vulnerability management and access controls, which are still befuddling IT pros.

  • April 26, 2016 26 Apr'16

    Simple, yet undetectable Windows AppLocker bypass discovered

    A Windows command-line utility dating back to XP, Regsvr32, reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass.

  • April 22, 2016 22 Apr'16

    'Going dark' battle moves to Congressional encryption hearing

    Experts face off in Congress over 'going dark' encryption debate, stake out positions on security, privacy and government access; polls show support for strong encryption.