Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content tagged with Operational Security
Page 1 / 2   >   >>
IT Modernization: Needed & Not Easy
Larry Loeb  
7/26/2019   Post a comment
'Challenges with architecture modernization' ranks high on IT survey respondents' list of grievances.
Demand for Certain B2B Security Software Accelerates
Larry Loeb  
7/11/2019   Post a comment
B2B security software is growing faster than overall B2B software sales, according to new figures.
The Cracking of RSA-2048 Encryption Will Come Sooner Than Had Been Thought
Larry Loeb  
6/21/2019   Post a comment
Advances in both QC and QC methods will see to that.
Strategic Security Equals Faster Digital Transformation
Larry Loeb  
5/23/2019   Post a comment
Survey finds that respondents who adopted a more traditional or reactive approach to their data protection and security program did not believe they would reach their digital transformation goals.
How to Stop Insider Breaches From Becoming the Norm
Mark Bower  
5/17/2019   1 comment
Data breaches are now so common we rarely go a day without hearing about the latest one.
Enterprise Resilience: It's the Ecosystem, Stupid
Larry Loeb  
5/7/2019   2 comments
Organizations must rethink their approach to security in a way that defends not just themselves, but the entire ecosystem they inhabit, says Accenture report.
Security Workforce 2019: Closing the Gap Builds a Bridge to the Future
Steve Durbin  
5/7/2019   1 comment
To plug the ongoing cybersecurity skills gap, those doing the hiring need to start thinking outside the box.
Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems
Steve Durbin  
4/2/2019   1 comment
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.
Artificial Intelligence in Modern Cybersecurity Operations
George Wrenn  
3/28/2019   12 comments
As a rapidly evolving field of science, AI has become flexible to new approaches and tools allowing even cutting-edge technology such as quantum computing under its umbrella of methods.
Worldwide Study Finds Limited Advances Against Evolving Threats
Larry Loeb  
3/28/2019   16 comments
Security vendor SonicWall has issued its SonicWall Cyber Threat Report based on its experiences in 2018.
5 Years of the NIST Cybersecurity Framework
Joe Stanganelli  
3/26/2019   1 comment
With NIST celebrating the five-year anniversary of its widely adopted and recommended Cybersecurity Framework just last month, a look back over the years illustrates how far the Framework has come.
Facebook Exposes Millions of Unencrypted User Passwords
Larry Loeb  
3/22/2019   53 comments
It's an internal matter – but it could affect millions of the social network's users.
FIN7 Resurfaces With New Malware Techniques
Larry Loeb  
3/22/2019   5 comments
The FIN7 group of cyber criminals is still going strong.
Is Your Supply Chain the Weakest Link?
Steve Durbin  
3/19/2019   2 comments
Despite organizations' best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain.
Convergence: Real Problems When it Comes to Securing the IoT/IIoT
Alan Zeichick  
3/14/2019   Post a comment
Today, enterprises are dealing with a proliferation of connected devices that probably aren't dedicated to computing – think video cameras, inventory sensors, machine tools, thermostats and environmental monitors.
Study Finds 77% of Mobile Users Compromised by Leak of PII Data
Larry Loeb  
3/8/2019   Post a comment
It doesn't help that 43% of companies have at least one mobile device with no lock screen active.
Boosted Rowhammer & Cache Attacks Spell Bad News for Intel
Larry Loeb  
3/5/2019   Post a comment
Researchers from Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany have published a paper that is really bad news for Intel.
Digital Signatures Can Be Forged in PDF Docs
Larry Loeb  
3/1/2019   18 comments
Researchers in Germany have figured out three different ways to forge digital signatures in PDF documents.
Here it Comes – Internet Privacy Regulation
Larry Loeb  
2/22/2019   13 comments
A new report by the US Government Accountability Office could be the catalyst for meaningful change on the Internet privacy front.
Take White Hats Seriously to Staunch the Flow of Zero-Days
Joe Stanganelli  
2/19/2019   10 comments
Zero-day vulnerabilities are serious, and on the rise. And IT-security teams make the problem worse when they fail to respond, or respond poorly, to responsible vulnerability disclosures.
Container Vulnerability: Still a Reality
Larry Loeb  
2/18/2019   4 comments
A security problem with runC that could allow attackers to escape Linux containers and obtain unauthorized, root- level access to the host operating system is on the move.
Google Moves to Control More of the Internet
Larry Loeb  
2/13/2019   5 comments
The company has said that its goal is only to create a faster Internet, which allows for more use and hence more searches and thus more revenue for them.
AI & 'Fuzzing' Combination Empowers APT
Larry Loeb  
2/11/2019   2 comments
When the bad guys add AI and 'fuzzing' to their armory, the advanced persistent threat gets, erm, even more threatening.
How Secure Is Manufacturing?
Larry Loeb  
2/8/2019   4 comments
Study finds that manufacturing industries struggle to find skilled cybersecurity staff and are underspending on training – but it's not all bad news...
Google's GDPR Fine: What It Means for Jurisdictional Arbitrage
Joe Stanganelli  
2/7/2019   1 comment
In the wake of France's recent €50 million GDPR fine against Google, enterprises should consider GDPR-enforcement considerations when determining the base of their EU operations.
Modern Enterprise – Stewards of Personal Data
Larry Loeb  
2/6/2019   3 comments
Get on the nine-step program if you want to assure data privacy.
A Collaborative Approach to Cybersecurity: Beyond ISACs
Cody Cornell  
2/5/2019   1 comment
When it comes to fighting cyber threats, automation and collaboration could help SOCs do more with less.
Should All IAM Be CIAM?
Joe Stanganelli  
1/30/2019   6 comments
CIAM vendors are right that traditional IAM isn't going to cut it for customer-facing solutions – but their sound premises have led to the perverse conclusion of keeping in-house IAM systems suboptimal. What if the power of CIAM could help employees realize better usability and security too?
Four Enterprise Identity & Access Management Trends to Watch in 2019
Alan Zeichick  
1/25/2019   25 comments
For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  
1/18/2019   3 comments
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
Exposed Oklahoma Server Shows On-Premises Data Is Vulnerable, Too
News Analysis  
1/18/2019   16 comments
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
'Collection #1' Repository Totals 87GB of Stolen Email Addresses & Passwords
News Analysis  
1/17/2019   1 comment
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
A Diverse Security Workforce Is a Stable Security Workforce
News Analysis  
1/17/2019   2 comments
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Fancy Bear's LoJax C&C Servers Still Functioning in the Wild
News Analysis  
1/17/2019   Post a comment
A new report from NetScout's ASERT Team found that two command-and-control servers associated with Fancy Bear's LoJax malware are still active.
Cyber Attacks, Climate Change Are Top Global Risk for Businesses & Governments
News Analysis  
1/17/2019   Post a comment
The World Economic Forum ranks climate change, economic instability, cyber attacks and data thefts as some of the top concerns facing businesses around the globe.
Justice Department Indicts 2 Ukrainian Nationals With Hacking SEC
News Analysis  
1/16/2019   1 comment
The Justice Department has charged two Ukrainian nationals with hacking into the SEC's EDGAR systems and accessing sensitive company reports and other data before the information was made public.
Federal Judge: Police Can't Force Suspects to Unlock Devices Using Biometrics
Larry Loeb  
1/16/2019   1 comment
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
Zix Acquiring AppRiver to Bolster Email Security for SMBs
News Analysis  
1/16/2019   Post a comment
In a move to bolster its email security portfolio for small and midsized businesses, Dallas-based Zix is paying $275 million for AppRiver.
Schneider Electric EV Charging Stations Vulnerable to Attack
News Analysis  
1/15/2019   1 comment
Researchers at Positive Technologies have found three vulnerabilities within Schneider Electric's EVlink Parking electric vehicle charging stations, which could allow an attacker to take control of the system.
Average Cyber Attack Cleanup Tops $1M, Radware Finds
News Analysis  
1/15/2019   1 comment
Over the last year, the amount that companies pay out to clean up from a cyber attack jumped more than 50%, topping $1 million on average, according to a new industry survey from Radware.
Texas City Hit With Ransomware
News Analysis  
1/15/2019   Post a comment
It's back to paper and pen for a while for Del Rio, Texas, which was hit with a ransomware attack earlier this month.
Ryuk Ransomware Origin Remains a Mystery
News Analysis  
1/14/2019   Post a comment
After shutting down newspaper printing facilities, as well as a cloud hosting firm, security researchers are debating who is behind the Ryuk ransomware. While it seemed that North Korea played a role, more research shows that a Russian gang might be responsible.
US Government Shutdown Preventing SSL Certificates From Being Renewed
Larry Loeb  
1/14/2019   Post a comment
The shutdown of the federal government is not only affecting federal workers, but the websites that various departments run. Specifically, SSL certificates are not being renewed.
Iran Suspected of 'Stealthy & Sophisticated' DNS Hijacking Campaign
Larry Loeb  
1/11/2019   Post a comment
New research from FireEye suggests that a group working within Iran is behind a large-scale DNS hijacking scheme that involves web traffic all across the globe.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  
1/11/2019   Post a comment
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Hyatt Hotels Kicks Off Bug Bounty Program
News Analysis  
1/11/2019   1 comment
Hyatt Hotels is teaming with HackerOne on a new bug bounty hunting program that looks to pay up to $4,000 for ‘critical’ vulnerabilities in software.
Wi-Fi 6 Bakes in Additional IoT Security
Larry Loeb  
1/10/2019   8 comments
At CES this week, the Wi-Fi Alliance offered new details on the new Wi-Fi 6 protocol, which bakes in some additional safeguards for IoT security.
Sophos & Akamai Target Cloud Security With Acquisitions
News Analysis  
1/9/2019   Post a comment
As companies move more data to the cloud, data security becomes a major issue. To address these concerns, Sophos is acquiring Avid Security and Akamai inked a deal for Janrain.
Page 1 / 2   >   >>




Latest Articles
Equipment at a nuclear power plant in Ukraine was used to mine cryptocurrency.
Why NRDs should matter to the security community.
Some startups need to shape up or ship out.
Hardware for security may just get hot.
There is a protocol in Windows that has been around since the days of Windows XP, which has been found to be insecure.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with