Advertisement
Top

Tag: Analysis


Access control, Cloud security

Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert

August 12, 2016

Via: Security Intelligence

Envision B2C scenarios like online retail to customer, university to student or retail banking to account holder: Users come and go, and user management can quickly become burdensome, especially in traditional identity and access management (IAM) environments. Managing millions of […]


Cyber warfare, Cyber-crime

What I learned playing prey to Windows scammers

July 8, 2016

Via: CSO Online

The callers are polite, and they sound very earnest, explaining in great detail how hackers can loot your bank accounts, steal your identity, and compromise passwords. They are intent on convincing you the threat is not only real but hackers […]


Phishing

Spear-phish the technical director

June 13, 2016

Via: ITSecurity UK

Wouldn’t it be something if you managed to spear-phish the technical director of an anti-malware company? The criminal kudos would be sky-high; but just imagine the possible effect of getting top-level credentials into a cloud-based anti-malware product that automatically pushes […]


Privacy protection

What Should Security Cost?

February 9, 2016

Via: Dark Reading

Isn’t it difficult to put a price tag on digital security? We can compare security budgets across our peers, calculate the cost of a security breach, and even estimate the probability of various threats, but we cannot definitively state that […]


Network security

The Secret Sauce of a Successful Security Platform

February 9, 2016

Via: Security Intelligence

In my rather long career in product development, I have asked myself many times what would have made my products successful in the market. I reached the conclusion that the features and extensibility of the product itself are not enough, […]


Data loss

Data Loss Prevention: Make It Work

January 27, 2016

Via: Security Week

As the name implies, DLP is about preventing loss or misuse of data. By various means, including content discovery and analysis, it helps preclude end users from accidentally or maliciously sharing sensitive, critical, and confidential data that might put a […]


Vulnerabilities

Many embedded devices ship without adequate security tests, analysis shows

November 23, 2015

Via: CIO

An analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]


Data loss

Healthcare Biggest Offender In 10 Years Of Data Breaches

September 22, 2015

Via: data-loss

Over the past 10 years of #data breach history, 41 percent of breaches were caused not by hacking, but by device loss. Because of a particularly bad record of holding track of its #devices, the #healthcare industry has been responsible […]


Hacker

Hackers are spending a huge amount of resources targeting financial services

June 25, 2015

Via: hacker

Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous attacks pointed at global targets dealing in finance. By analyzing data on attack patterns unique […]


Hacker

Analysis of Equation Group and espionage platform discovers another link to the NSA

March 12, 2015

Via: hacker

#kaspersky lab researchers continue to analyze the #software and digital artifacts tied to the Equation Group, a nation-state threat actor that has been active for almost twenty years, and to present their discoveries to the public. They shared more information […]