Advertisement
Top

Tag: Risk


Network security

How bad are Meltdown and Spectre?

January 23, 2018

Via: CSO Online

I’ve been surprised by the lack of interest, by both the general public and some IT admins, in the Meltdown and Spectre vulnerabilities, which are arguably the most significant computer vulnerabilities we have ever dealt with. To be fair, this […]


Cloud security

Allscripts Ransomware Attack a Reminder of Cloud Risks

January 23, 2018

Via: DataBreach Today

A ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need […]


Network security

The Rising Dangers of Unsecured IoT Technology

December 5, 2017

Via: Dark Reading

As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices. Earlier this year, the Food and Drug Administration (FDA) […]


Cloud security

Shadow cloud apps pose unseen risks

October 10, 2017

Via: CSO Online

It happens in every company. Employees find a cool new online service that makes them more productive. They create free or low-cost accounts on devices they use for work, and get all their friends and colleagues to join up. The […]


Identity theft

The CISO’s Guide to Minimizing Health Care Security Risks

October 6, 2017

Via: Security Intelligence

In an ever-changing, dynamic threat landscape, a chief information security officer (CISO) in the health care sector must have knowledge in multiple areas and understand that data breaches have severe repercussions that affect employees, patients and the organization at large. […]


Cloud security

The Cloud Security Risks Hidden in Plain Sight

September 22, 2017

Via: Security Intelligence

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to […]


Application security, Vulnerabilities

Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code

August 23, 2017

Via: Security Intelligence

Employees use open source applications in organizations of all sizes and across all industries, and this trend shows no signs of slowing down. It is both cost effective and efficient to incorporate source code into software during the development stage. […]


Network security

Assessing Cyber and Physical Risks to Oil and Gas Sector

August 22, 2017

Via: Security Week

It should come as no surprise that the upward trend of larger-scale attacks against critical infrastructure poses substantial cyber and physical risks across the enterprise. After all, critical infrastructure sectors are categorized as such because, according to the Department of […]


Network security

Torify and analyze traffic for your VM

March 10, 2017

Via: Malwarebytes

Virtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time, the default networking configuration uses a bridge to allow VMs to communicate. One caveat about this approach is that […]


Malware, Virus & Malware

Pre-installed Lenovo Bloatware Causing More Security Problems

May 9, 2016

Via: Security Week

On the heels of the Superfish embarrassment earlier this year, the Chinese computer manufacturer is warning that multiple vulnerabilities in the “Lenovo Solution Center” could expose millions of users to malicious hacker attacks. The most serious of the four vulnerabilities, […]


Security

The Importance of Having an Effective Incident Response Team

November 23, 2015

Via: Security Intelligence

Increasing your employees’ security IQ is a critical step toward securing your key corporate assets. While this step is important, it is essential that other initiatives be implemented simultaneously. In order to create a fully integrated security approach, executives must […]


Access control

Cable modem remote backdoor, inside a backdoor

November 23, 2015

Via: Dark Matters

A backdoor inside a backdoor. Sounds ominous doesn’t it? The bad guys simply love it. Your Internet Service Provider (ISP) can be your weakest link, in the realm of cable modem security. Some ISP’s rank worse than others, when it […]


Data loss

Internal employees account for 43 percent of data loss

September 21, 2015

Via: data-loss

Although a majority of data compromises come from external actors, including nation-state groups and cyber-crime gangs, #internal #employees account for 43 percent of #data loss, half of the time these leaks are accidental, a new #study from #intel security indicates. […]


Hacker

Outdated WordPress websites are sitting ducks

September 6, 2015

Via: hacker

Content Management systems (CMS) have become an attractive target for #hackers who aim to #exploit #vulnerabilities in the popular blogging platform #wordpress. Globally, more than 20 percent of WordPress based-websites are running older core versions. #outdated WordPress plugins are also […]


Network security

Pentagon Email Network Shut Down During Investigation

July 29, 2015

Via: network-security

A portion of the Department of Defence’s nonclassified email network used by Army General Martin Dempsey and other members of the U.S. military’s Joint Staff has been shuttered after “suspicious activity” was detected on the systems over the weekend. “We […]


Threats & Malware

180 Million Windows XP Users Exposed to Threats as Microsoft Stops All Security Updates

July 16, 2015

Via: threats-and-malware

Microsoft has announced that, as of July 15, all security solutions for XP users will stop receiving updates, leaving users exposed to threats. Windows XP will no longer provide the Malicious Software Removal Tool or updates to Microsoft Security Essentials. […]


Cloud security

Swift adoption of cloud and mobile drives insider threats

June 9, 2015

Via: cloud-security

Bitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and #mobile devices, the inability to protect […]


Data loss

70% of breaches are detected by a third-party

June 4, 2015

Via: data-loss

46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the survey of 1,000 IT professionals, conducted by OnePoll on behalf […]


Hacker

IoT devices entering enterprises, opening company networks to attacks

June 3, 2015

Via: hacker

OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses. Using anonymized data from the billions of Internet requests routed through OpenDNS’s global […]


Cyber warfare

Complex security solutions are exposing companies to risk

May 28, 2015

Via: Cyber Warfare

Companies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software revealed. The survey, which was carried out at RSA […]