Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security experts share their thoughts on the "Darkhotel" espionage campaign and provide recommendations for executives who travel a lot and don't want sensitive corporate information to end up in the hands of cyber spies.
Central Dermatology Center of North Carolina said that one of its servers was breached by hackers back in August of 2012, but just became aware of the breach.
The Australian Signals Directorate is warning that cyber-criminals will target the upcoming G20 summit in Brisbane, saying they could include state-sanctioned hackers, trade spies or activists.
In a two-year study of information about critical control systems directly connected to the Internet, researchers found mining equipment, a surprising number of wind farms, a crematorium, water utilities, and several substations.
Supermarket chains Supervalu and Albertson's revealed that some of their payment processing systems have once again been breached.
Google, Dropbox, the Open Technology Fund and several security researchers have joined forces for a new initiative that focuses on usable secure technologies.
Cyber risk intelligence company SurfWatch Labs has released a new application designed to provide C-level executives and board members with clear information on cyber risks faced by their company.
Codenomicon has launched a new verification program designed to help critical systems manufacturers test the security and robustness of their products.
Operation Epic Turla targeted intelligence agencies, government institutions, embassies, military groups, education institutions, and research and pharmaceutical companies in more than 45 countries, the security firm said on Thursday.
FireEye has announced a new line of services designed specifically to help insurance brokers and underwriters measure and minimize client exposure to cyber threats.

FEATURES, INSIGHTS // Risk Management

rss icon

James McFarlin's picture
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.
Adam Firestone's picture
Security requirements for information assurance, risk management, and certification and accreditation constrain Government organizations with respect to software allowed on Government networks.
Joshua Goldfarb's picture
In resource-limited environments, every alert counts. Spear alerting is an approach that can help organizations improve their signal-to-noise ratio and make their security programs much more efficient and effective.
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
James McFarlin's picture
What key forces are driving the demand for cyber insurance and how can such coverage best fit into an overall cybersecurity strategy?
Jason Polancich's picture
Sharing threat information, analysis and expertise within your “extended family” can be very valuable to establishing the kind of early warning system that is the promise of cyber information sharing to begin with - and without most of the risks.
Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
James McFarlin's picture
Whether Adm. Michael Rogers can capitalize on opportunities to pull together the teamwork necessary to shore up America’s cybersecurity is a game just begun.
Joshua Goldfarb's picture
When looking to measure the success and progress of a security program, it is important to think about what success and progress actually mean.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.