The Financial Impact of Cyber Threats
Commentary | 12/27/2017 | Determining the financial impact of specific IT vulnerabilities is a good way to prioritize remediation and prevent attacks.
Digital Forensics & the Illusion of Privacy
Commentary | 12/21/2017 | Forensic examiners don't work for bounties. They do what is required to catch criminals, pedophiles, or corporate embezzlers, and now their important security research is finally being acknowledged.
The Hard Work of Pointing Fingers
Larry Loeb | 12/21/2017 | Pointing the finger at a perpetrator is difficult. Pointing it at the right perpetrator is even harder. That doesn't stop many organizations from trying.
Picker Mentality Supercharges Malware
Larry Loeb | 12/18/2017 | The picker mentality, reusing code and techniques that have worked before, is making malware stronger and more difficult to defend against.
Security for the Broken Business
Curt Franklin | 12/18/2017 | What is the IT security's responsibility when the business itself is intrinsically secure? The first step may be to point out the obvious.
Is Your Security Workflow Backwards?
Commentary | 12/15/2017 | The pace at which information security evolves means organizations must work smarter, not harder. Here's how to stay ahead of the threats.
Russian DNS Gobbling Up Internet Traffic
Larry Loeb | 12/15/2017 | BGPMON researchers have found that Russian DNS servers redirected Internet traffic through Russia several times earlier this month. The question is whether it's a test or a harbinger of things to come.
enSilo Researchers: Your NTFS Transactions Belong to Us
Larry Loeb | 12/11/2017 | A pair of researchers from enSilo have disclosed how they created a new vulnerability within Windows-based systems that can compromise NTFS transactions, and the worst part is that security vendors are not prepared.
Ransomware Meets 'Grey's Anatomy'
Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks.
Equifax Breach Points to Similar Security Concerns – Report
Simon Marshall | 12/7/2017 | The Equifax breach earlier this year exposed more than 140 million personal records, shocking many people. However, a new Fortinet report shows that the vulnerabilities used in that attack are becoming more common.
Why Third-Party Security Is your Security
Partner Perspectives | 12/7/2017 | Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.
Crypto Wars: The Show That Never Ends
The German Interior Ministry is spearheading an effort to create a new law that would require tech companies to provide backdoors for a range of devices. It's the latest salvo in the war over encryption.
The Rising Dangers of Unsecured IoT Technology
As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.
|