March 20, 2019
Via: Help Net SecurityRegardless of their size, organizations share a common challenge: IT security teams are understaffed and overextended. The number of security alerts, the challenge of what to prioritize, and the shortage of expertise can be overwhelming and introduce risk. The Trend […]
December 13, 2018
Via: Help Net SecurityAccording to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all internet traffic to and from their customers equally. Security measures, like blocking traffic on certain ports, are […]
September 12, 2018
Via: Dark ReadingIt’s more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage. In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout […]
February 24, 2017
Via: MalwarebytesMore companies are falling victim to cyberattacks, as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it […]
November 4, 2016
Via: The HillOhio’s secretary of state will use the National Guard’s cybersecurity team to bolster its election systems, The Associated Press is reporting. Jon Husted, a Republican, will also take advantage of the FBI, the Department of Homeland Security and private security […]
October 5, 2016
Via: Russel EdwardsOnce a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ […]
Data loss, Privacy protection, Security
September 30, 2016
Via: TrendMicro BlogWith the recent announcement of more than 500 million accounts impacted by a security breach, many Yahoo users have been changing their passwords. After all, that’s the official guidance. However, as ZDI’s Simon Zuckerbraun points out, a new password isn’t enough. […]
August 12, 2016
Via: TrendMicro BlogIn many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web users, and edited in real time. Events that occur on one […]
June 29, 2016
Via: Security IntelligenceIn the U.S., the transportation sector is defined to include a number of sub-sectors such as aviation, highway infrastructure, maritime transportation, mass transit and passenger rail, pipeline systems, freight rail, and postal and shipping. This is an extensive network of […]
June 15, 2016
Via: Russel EdwardsThe December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via […]
November 11, 2015
Via: CSO OnlineData privacy law is murky since Europe’s highest court struck down the Safe Harbor agreement long used between the U.S. and Europe. Some cloud storage vendors now plan to help enterprises adjust to the new reality. Last week, Amazon announced […]
Access control, Editorial, Security
August 12, 2015
Via: Russel EdwardsThe air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to […]
April 30, 2024
April 11, 2024
April 30, 2024