Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Latest Content tagged with Operational Security
Page 1 / 2   >   >>
IT Modernization: Needed & Not Easy
Larry Loeb  
7/26/2019   Post a comment
'Challenges with architecture modernization' ranks high on IT survey respondents' list of grievances.
Demand for Certain B2B Security Software Accelerates
Larry Loeb  
7/11/2019   Post a comment
B2B security software is growing faster than overall B2B software sales, according to new figures.
The Cracking of RSA-2048 Encryption Will Come Sooner Than Had Been Thought
Larry Loeb  
6/21/2019   Post a comment
Advances in both QC and QC methods will see to that.
Strategic Security Equals Faster Digital Transformation
Larry Loeb  
5/23/2019   Post a comment
Survey finds that respondents who adopted a more traditional or reactive approach to their data protection and security program did not believe they would reach their digital transformation goals.
How to Stop Insider Breaches From Becoming the Norm
Mark Bower  
5/17/2019   1 comment
Data breaches are now so common we rarely go a day without hearing about the latest one.
Enterprise Resilience: It's the Ecosystem, Stupid
Larry Loeb  
5/7/2019   2 comments
Organizations must rethink their approach to security in a way that defends not just themselves, but the entire ecosystem they inhabit, says Accenture report.
Security Workforce 2019: Closing the Gap Builds a Bridge to the Future
Steve Durbin  
5/7/2019   1 comment
To plug the ongoing cybersecurity skills gap, those doing the hiring need to start thinking outside the box.
Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems
Steve Durbin  
4/2/2019   1 comment
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.
Artificial Intelligence in Modern Cybersecurity Operations
George Wrenn  
3/28/2019   12 comments
As a rapidly evolving field of science, AI has become flexible to new approaches and tools allowing even cutting-edge technology such as quantum computing under its umbrella of methods.
Worldwide Study Finds Limited Advances Against Evolving Threats
Larry Loeb  
3/28/2019   16 comments
Security vendor SonicWall has issued its SonicWall Cyber Threat Report based on its experiences in 2018.
5 Years of the NIST Cybersecurity Framework
Joe Stanganelli  
3/26/2019   1 comment
With NIST celebrating the five-year anniversary of its widely adopted and recommended Cybersecurity Framework just last month, a look back over the years illustrates how far the Framework has come.
Facebook Exposes Millions of Unencrypted User Passwords
Larry Loeb  
3/22/2019   53 comments
It's an internal matter – but it could affect millions of the social network's users.
FIN7 Resurfaces With New Malware Techniques
Larry Loeb  
3/22/2019   5 comments
The FIN7 group of cyber criminals is still going strong.
Is Your Supply Chain the Weakest Link?
Steve Durbin  
3/19/2019   2 comments
Despite organizations' best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain.
Convergence: Real Problems When it Comes to Securing the IoT/IIoT
Alan Zeichick  
3/14/2019   Post a comment
Today, enterprises are dealing with a proliferation of connected devices that probably aren't dedicated to computing – think video cameras, inventory sensors, machine tools, thermostats and environmental monitors.
Study Finds 77% of Mobile Users Compromised by Leak of PII Data
Larry Loeb  
3/8/2019   Post a comment
It doesn't help that 43% of companies have at least one mobile device with no lock screen active.
Boosted Rowhammer & Cache Attacks Spell Bad News for Intel
Larry Loeb  
3/5/2019   Post a comment
Researchers from Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany have published a paper that is really bad news for Intel.
Digital Signatures Can Be Forged in PDF Docs
Larry Loeb  
3/1/2019   18 comments
Researchers in Germany have figured out three different ways to forge digital signatures in PDF documents.
Here it Comes – Internet Privacy Regulation
Larry Loeb  
2/22/2019   13 comments
A new report by the US Government Accountability Office could be the catalyst for meaningful change on the Internet privacy front.
Take White Hats Seriously to Staunch the Flow of Zero-Days
Joe Stanganelli  
2/19/2019   10 comments
Zero-day vulnerabilities are serious, and on the rise. And IT-security teams make the problem worse when they fail to respond, or respond poorly, to responsible vulnerability disclosures.
Container Vulnerability: Still a Reality
Larry Loeb  
2/18/2019   4 comments
A security problem with runC that could allow attackers to escape Linux containers and obtain unauthorized, root- level access to the host operating system is on the move.
Google Moves to Control More of the Internet
Larry Loeb  
2/13/2019   5 comments
The company has said that its goal is only to create a faster Internet, which allows for more use and hence more searches and thus more revenue for them.
AI & 'Fuzzing' Combination Empowers APT
Larry Loeb  
2/11/2019   2 comments
When the bad guys add AI and 'fuzzing' to their armory, the advanced persistent threat gets, erm, even more threatening.
How Secure Is Manufacturing?
Larry Loeb  
2/8/2019   4 comments
Study finds that manufacturing industries struggle to find skilled cybersecurity staff and are underspending on training – but it's not all bad news...
Google's GDPR Fine: What It Means for Jurisdictional Arbitrage
Joe Stanganelli  
2/7/2019   1 comment
In the wake of France's recent €50 million GDPR fine against Google, enterprises should consider GDPR-enforcement considerations when determining the base of their EU operations.
Modern Enterprise – Stewards of Personal Data
Larry Loeb  
2/6/2019   3 comments
Get on the nine-step program if you want to assure data privacy.
A Collaborative Approach to Cybersecurity: Beyond ISACs
Cody Cornell  
2/5/2019   1 comment
When it comes to fighting cyber threats, automation and collaboration could help SOCs do more with less.
Should All IAM Be CIAM?
Joe Stanganelli  
1/30/2019   6 comments
CIAM vendors are right that traditional IAM isn't going to cut it for customer-facing solutions – but their sound premises have led to the perverse conclusion of keeping in-house IAM systems suboptimal. What if the power of CIAM could help employees realize better usability and security too?
Four Enterprise Identity & Access Management Trends to Watch in 2019
Alan Zeichick  
1/25/2019   25 comments
For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  
1/18/2019   3 comments
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
Federal Judge: Police Can't Force Suspects to Unlock Devices Using Biometrics
Larry Loeb  
1/16/2019   1 comment
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
US Government Shutdown Preventing SSL Certificates From Being Renewed
Larry Loeb  
1/14/2019   Post a comment
The shutdown of the federal government is not only affecting federal workers, but the websites that various departments run. Specifically, SSL certificates are not being renewed.
Iran Suspected of 'Stealthy & Sophisticated' DNS Hijacking Campaign
Larry Loeb  
1/11/2019   Post a comment
New research from FireEye suggests that a group working within Iran is behind a large-scale DNS hijacking scheme that involves web traffic all across the globe.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  
1/11/2019   Post a comment
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Wi-Fi 6 Bakes in Additional IoT Security
Larry Loeb  
1/10/2019   8 comments
At CES this week, the Wi-Fi Alliance offered new details on the new Wi-Fi 6 protocol, which bakes in some additional safeguards for IoT security.
Spectre, Meltdown Vulnerabilities Will Haunt Industry for Years
Jeffrey Burt  
1/8/2019   2 comments
Chip makers such as Intel have released patches and fixes to mitigate Spectre and Meltdown issues, but the problem won't be solved until they come out with new architectures, which is two to three years away.
Academics Look to Bolster the Optimization of Neural Networks
Larry Loeb  
1/7/2019   2 comments
A trio of academic papers looks at the current methods used to train neural networks and where the techniques can be improved in order to benefit the businesses that use them.
US Air Force: 5G Dominance Critical to National Security
Joe Stanganelli  
1/7/2019   1 comment
In a November 2018 report, the US Air Force's Electromagnetic Defense Task Force ranks control of 5G networks and spectrum as a top priority for national security in the event of a substantial electromagnetic disturbance.
New USB Type-C Standards Offer Cryptographic-Based Security
Larry Loeb  
1/4/2019   19 comments
The USB-IF has published new guidelines that looks to bring tougher security protocols, including cryptography, to USB Type-C devices to better protect against attacks.
EU's FOSSA Project Launches New Bug Bounty Program
Larry Loeb  
1/3/2019   4 comments
The European Union's FOSSA project is launching its first-ever bug bounty program that will focus on 15 different software platforms starting later in January.
Ten Cybersecurity Predictions That I Don't Like for 2019
Alan Zeichick  
1/1/2019   32 comments
If 2018 turned into a security headache for enterprises, our writers predicts that 2019 won't be much better – maybe even worse.
Healthcare Industry Still in Ransomware Crosshairs
Jeffrey Burt  
12/27/2018   16 comments
A report by Kaspersky researchers has found that healthcare organizations in the US and Canada are still at heightened risk of ransomware attacks.
SOP Story: Why Protecting Web Browsers Remains a Security Cornerstone
Larry Loeb  
12/24/2018   22 comments
One of the oldest ways to protect content on the web is SOP. However, it's not always implemented in the same way on all browsers. This can complicate one of the main cornerstones of Internet security.
Cloud Backup: How It Can Protect Against Ransomware
Jeffrey Burt  
12/20/2018   1 comment
For enterprises anxious to avoid being extorted by attackers using ransomware, backing up data to the cloud is an option to consider, though it's not the answer for everyone.
Email Spam: Don't Be a Chump or a Jerk
Alan Zeichick  
12/20/2018   3 comments
For decades, spam emails have clogged up corporate email inboxes. However, there are some simple rules and guidelines IT pros, as well as marketers, can use to cut down on this, and make everyone more secure.
Many Enterprises Still Blind to Security Risk, Study Finds
Jeffrey Burt  
12/19/2018   1 comment
Even as organizations continue to get hit with cyber attacks, they're struggling to accurately measure the costs of such events to their operations, a report by Tenable and the Ponemon Institute found.
SQLite Vulnerability Could Put Thousands of Apps at Risk
Larry Loeb  
12/17/2018   6 comments
A significant bug in SQLite could allow for remote code execution, leaks of memory and program crashes within thousands of apps, according to new research.
Phishing Emails, Trojans Continued to Proliferate in Q3 – Report
Larry Loeb  
12/14/2018   6 comments
Researchers at Comodo Cybersecurity found that phishing emails continued to proliferate in the third quarter of this year, with PayPal as a major target. Malware, such as Trojans, also remain a top security issue.
Page 1 / 2   >   >>




Latest Articles
Some startups need to shape up or ship out.
Hardware for security may just get hot.
There is a protocol in Windows that has been around since the days of Windows XP, which has been found to be insecure.
Establishing a business-focused security assurance program is a long-term, ongoing investment.
A syntax construct inside the TCL language is allowing injection attacks to occur.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with