January 6, 2020
Via: Help Net Security2019 was a bad year for data security. By virtually every metric, it was the worst ever. According to the Ponemon Institute’s 2019 Cost of a Data Breach Report, the average cost of a data breach reached $3.92 million, the […]
June 6, 2019
Via: Help Net SecurityIn the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvious, they can also create […]
February 8, 2019
Via: TechRadarDealing with risk is something businesses do every day and in today’s digital world IT outages can have severe consequences for companies of any size. To aid businesses in understanding the risks they face, global insurer Allianz releases a Risk […]
August 10, 2018
Via: The HillDemocrats on the House Oversight and Government Reform Committee are urging its Republican chairman to subpoena the State Department for documents related to former Secretary Rex Tillerson’s move to close an office responsible for advancing U.S. interests in cyberspace. The […]
August 9, 2018
Via: The HillHouse Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday again urged the Senate to pass legislation that would rename and reorganize the Department of Homeland Security’s cyber wing, citing compounding threats to U.S. interests in cyberspace. The legislation would […]
August 8, 2018
Via: The HillA cybersecurity firm says it uncovered the methods and tools hackers use to target critical infrastructure organizations, activity it observed by creating a website that masqueraded as a major electricity provider. Cybereason on Monday released a report on its “Honeypot […]
July 30, 2018
Via: Dark ReadingYour data, identities, and credentials are cyber chum. Here’s how to protect yourself from the feeding frenzy. Your odds of being attacked by a shark are zero if you never venture into the ocean — which is far lower than […]
Threats & Malware, Vulnerabilities
January 4, 2018
Via: The HillThe massive cyber-vulnerability revealed this week in Intel’s chips goes beyond the firm and affects other companies’ chips as well, according to Intel. The chip flaw leaves many computer processors created over the last 10 years, according to some reports, open […]
December 12, 2017
Via: CSO OnlineIt is hard to turn on the television or read a tech blog without getting inundated with stories about bitcoin or blockchain. The biggest reason bitcoin is so popular is its nearly 2,000 percent increase in price over the last […]
December 5, 2017
Via: The HillA State Department official defended the decision to close an office dedicated to cyber diplomacy, saying it reflects an effort to integrate cyber and digital economy policymaking efforts. Secretary of State Rex Tillerson notified Congress in August of the department’s […]
June 4, 2015
Via: cloud-securityBAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. The company is introducing a suite of security products designed to defend against targeted attacks, […]
June 3, 2015
Via: cyber-crimeThe average cost for each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 in this year’s study. Some 47% of all breaches were caused by malicious or criminal attacks. Previously, these attacks […]
June 2, 2015
Via: vulnerabilitiesLancope is unveiling its new PacketWatch solution for intelligent packet capture this week at Infosecurity Europe 2015. With the PacketWatch solution, large enterprises can obtain deeper network visibility and more granular security context for streamlined incident response and forensics – […]
May 28, 2015
Via: Cyber WarfareCompanies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software revealed. The survey, which was carried out at RSA […]
May 25, 2015
Via: cyber-crimeResearchers at Context Information #security have demonstrated how easy it is to monitor and record #bluetooth Low Energy signals transmitted by many #mobile phones, wearable devices and iBeacons, including the iPhone and leading fitness monitors, raising concerns about #privacy and […]
May 6, 2015
Via: cyber-crimeSAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, SAP systems are not protected from cyber threats by traditional security approaches. Based on […]
May 5, 2015
Via: cyber-crime81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues. The Endurance survey also found that 31% of small businesses have experienced a cyber-attack […]
April 21, 2015
Via: cyber-crime#cyber attacks remain a persistent #threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web #attack vectors, increasing in popularity. As migration to the #cloud continues and expands, companies today […]
April 17, 2015
Via: cyber-crimePawn Storm, the long-standing economic and political #cyber–#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and Outlook accounts, the attackers send spear-phishing emails carrying malware and compromise websites to redirect […]
April 16, 2015
Via: threats-and-malware#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks […]