Will IT GRC Become IRM?
Analysts report a shift toward Integrated Risk Management across the enterprise, but IT risk management experts argue on how it'll happen
Service, Denied
Black Hat USA 2013 has lined up three DDoS-related Briefings, covering the topic from multiple angles
CSRF Still Armed And Dangerous
Cross-site request forgery may not get the same attention as SQLi or XSS, but it still poses considerable risk to Web apps
Eye Scans Meet Federal ID Cards
National Institute for Standards and Technology ruling gives government agencies the option to use use iris scans instead of fingerprints to identify card holder.
SMBs Should 'Game' incident-response
Incident-response exercises are valuable at helping companies respond more quickly to security events, but they can also help educate businesses about the importance of being prepared
Data Security: Who's Stealing Your Stuff?
According to Verizon's annual Data Breach Investigation Report, it's not the NSA or even a sys admin with superuser privileges like Edward Snowden that's the biggest threat.
NSA Data Collection Worrisome For Global Firms
Microsoft, Google, Facebook, and other tech firms have downplayed their participation in government spying programs, but U.S. and international companies should worry about access to their data in the cloud
How Attackers Thwart Malware Investigation
A researcher at Black Hat USA this month will dissect a recent attack, showing off attackers' techniques for making malware analysis harder and intelligence gathering more time consuming
Hack 99% Of Android Devices: Big Vulnerability
Critical vulnerability that affects almost all Android devices now in operation could allow attackers to use exploit code to easily infect devices with a Trojanized version of a legitimate app.
|