informationsecuritytoday.blogspot.com
Information Security Today: August 2014
http://informationsecuritytoday.blogspot.com/2014_08_01_archive.html
Wednesday, August 13, 2014. Digital Forensics Explained" Cited a Expert Testimony in US Supreme Court Case. Greg Gogolin's book,. Was cited 8 times in a recent US Supreme Court case. Expert testimony). The case concerned whether evidence admitted at petitioner’s trial was obtained in a search of petitioner’s cell phone that violated petitioner’s Fourth Amendment rights. Subscribe to: Posts (Atom). CRC Press Information Technology Books (Facebook). Digital Forensics Explained Cited a Expert Testi.
informationsecuritytoday.blogspot.com
Information Security Today: Why Insider Threats Are Succeeding
http://informationsecuritytoday.blogspot.com/2015/06/why-insider-threats-are-succeeding.html
Monday, June 1, 2015. Why Insider Threats Are Succeeding. Why Insider Threats Are Succeeding. As corporate networks expand in scope and geographic area, it has become easier for insider threats to access sensitive data and inflict catastrophic damage. While the malicious insider comes with a different set of challenges than other security concerns, organizations can protect themselves with the right tools and mindset. In this article, Lancope. Subscribe to: Post Comments (Atom). Im also editor of.
informationsecuritytoday.blogspot.com
Information Security Today: GAO: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies
http://informationsecuritytoday.blogspot.com/2015/06/gao-recent-data-breaches-illustrate.html
Thursday, June 25, 2015. GAO: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies. Seems obvious, doesn't it? The GAO has identified. Subscribe to: Post Comments (Atom). CRC Press Information Technology Books (Facebook). How Can Hospitals Protect Their Medical Equipment . GAO: Recent Data Breaches Illustrate Need for Stro. 86 Percent of Energy Security Professionals Believ. Amazon Themed Malware Targets Crypto Currency. Zombifying Cyber-attack Could Affect 50 Million.
informationsecuritytoday.blogspot.com
Information Security Today: October 2014
http://informationsecuritytoday.blogspot.com/2014_10_01_archive.html
Friday, October 31, 2014. It's Halloween, and it's not just trick-and-treaters that scare us, or TK Keanini. Keanini, Chief Technology Officer at Lancope,. Has compiled a number of short and horrifying cybersecurity scenarios entitled "Welcome to My Cyber Security Nightmare.". Welcome to My Cybersecurity Nightmare. User Participation in Cyber-Attacks. Instead of bad guys having to compromise hosts, what if they instead cut other people such as corporate insiders in on the profits? Another nightmare scena...
informationsecuritytoday.blogspot.com
Information Security Today: Amazon Themed Malware Targets Crypto Currency
http://informationsecuritytoday.blogspot.com/2015/06/amazon-themed-malware-targets-crypto.html
Friday, June 12, 2015. Amazon Themed Malware Targets Crypto Currency. AppRiver issued a warning about a stream of malicious emails attempting to pose as legitimate Amazon purchase confirmations but that actually injects malware, identified as the Fareit malware family. Once unleashed, it begins pilfering the target machine for just about every type of Crypto currency in existence. Troy Gill, manager of security research at AppRiver. Subscribe to: Post Comments (Atom). Why Insider Threats Are Succeeding.
informationsecuritytoday.blogspot.com
Information Security Today: 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week
http://informationsecuritytoday.blogspot.com/2015/06/86-percent-of-energy-security.html
Wednesday, June 24, 2015. 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week. Tripwire survey compares cybersecurity views of 400 energy executives and IT professionals. PORTLAND, Ore. – June 25, 2015 – Tripwire. Additional findings from the Tripwire survey include:. 8226; 94 percent of executives agree that their organization is a target for cyber criminals. Subscribe to: Post Comments (Atom). Who Knows More about You – The US, or...
informationsecuritytoday.blogspot.com
Information Security Today: 'Zombifying' Cyber-attack Could Affect +50 Million Internet Users
http://informationsecuritytoday.blogspot.com/2015/06/zombifying-cyber-attack-could-affect-50.html
Thursday, June 11, 2015. Zombifying' Cyber-attack Could Affect 50 Million Internet Users. More than 50 million people per month could be at risk of a mass-scale 'malvertising' cyber-attack that turns computers into Zombies, according to researchers at Websense, reports Lara Lackie of Eskenzi PR. TK Keanini, Lancope. CTO, added, "I think this quote from Websense says it all, and let me call out a few things here to highlight the salient points. These methods are popular for cybercrime because they require...
informationsecuritytoday.blogspot.com
Information Security Today: April 2015
http://informationsecuritytoday.blogspot.com/2015_04_01_archive.html
Wednesday, April 15, 2015. Verizon: Mobile Security Is a Back-Burner Issue for Now. As reported on CNET,. Enterprises should devote fewer resources to securing their mobile infrastructure, since it is less prone to attacks, Verizon Communications advises in its 2015 Data Breach Investigations Report. The telecom does expect mobile security to become more of a major issue once companies improve efforts in areas where hackers are more apt to invade. In-flight WiFi Risks Airline Security, says GAO. A scam i...
informationsecuritytoday.blogspot.com
Information Security Today: June 2015
http://informationsecuritytoday.blogspot.com/2015_06_01_archive.html
Monday, June 29, 2015. How Can Hospitals Protect Their Medical Equipment from Malware? The challenges in protecting hospitals from cyber attacks are very similar to those faced in ICS and SCADA environments; the equipment used in hospitals is not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation. The medical industry isn't alone in fighting this threat. As this article explains,. Thursday, June 25, 2015. Seems obvious, doesn't it? Additional...
brussels.agileconsortium.net
IT Today | Scaling Agile for the Enterprise
http://brussels.agileconsortium.net/2016/it-today
Scaling Agile for the Enterprise. IT Today: Informative Articles on Information and Communication Technology and Management. IT Today informs its readers of best practices, as well as of research into current and upcoming issues in information and communication technology (ICT). Articles take a how-to approach to their topics. They help readers solve problems and are applicable to on-the-job situations faced everyday by IT management, staff and consultants in all areas.