Breaches
Cloud Security: It’s in the Cloud - But Where? (Part II)
June 22, 2015 Added by:Steve Durbin
Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.
Comments (0)
7 Development AppSec Tricks to Keep the Hackers Away – Part 1
June 17, 2015 Added by:Tripwire Inc
The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.
Comments (0)
Cloud Security: It’s in the Cloud - But Where? (Part I)
June 15, 2015 Added by:Steve Durbin
Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.
Comments (0)
Several Hospira Drug Pumps Use Vulnerable Software: Researcher
June 10, 2015 Added by:Eduard Kovacs
A researcher who has analyzed the software installed on infusion pumps manufactured by Hospira says several models are plagued by the vulnerabilities disclosed earlier this year.
Comments (0)
Prioritizing Patch Management Critical to Security
June 09, 2015 Added by:Brian Prince
Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.
Comments (0)
Another Day, Another Health Insurance Breach
June 08, 2015 Added by:Peter Zavlaris
Insurance companies, especially those in healthcare, continue to be prime targets for cybercrime.
Comments (0)
Microsoft Patching: Don’t Forget to Read the Fine Print
May 21, 2015 Added by:Tripwire Inc
During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.
Comments (0)
Adobe Issued a Significant Update for Flash Player, Reader and Acrobat
May 14, 2015 Added by:Plagiarist Paganini
Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.
Comments (0)
VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts
May 14, 2015 Added by:Brian Prince
Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.
Comments (0)
Top Ten List of Most Exposed Software
May 12, 2015 Added by:Anthony M. Freed
Oracle Java, Apple QuickTime, and Adobe Reader lead the pack for the top ten most exposed software in the U.S., according to a new regional-based study of vulnerable and unpatched software deployed on PCs.
Comments (0)
Embracing Cyber Resilience in Today's Cyber-Enabled World
May 06, 2015 Added by:Steve Durbin
Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.
Comments (0)
5 Ways Schools Can Upgrade Cyber Security
May 06, 2015 Added by:Paul Lipman
Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.
Comments (0)
Serious Security Flaws Found in Hospira LifeCare Drug Pumps
May 06, 2015 Added by:Eduard Kovacs
Researchers have identified several critical vulnerabilities in Hospira LifeCare patient-controlled analgesia (PCA) infusion systems, which can be exploited by a remote attacker to take complete control of affected devices.
Comments (0)
Scenario-based Training for Nuclear Power Plants Based on Actual Nuclear Plant Cyber Incidents
May 06, 2015 Added by:Joe Weiss
There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.
Comments (0)
Flaws in WordPress eCommerce Plugin Expose Over 5,000 Websites
April 30, 2015 Added by:Eduard Kovacs
Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.
Comments (0)
Preview: Suits and Spooks London - May 6-7, 2015
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
Comments (0)
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids