Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Critical Infrastructure Executives Cite Need for Improvement in Managing Cyber-related RisksSenior corporate executives are placing a strong emphasis on risk management generally, but are falling short when it comes to extending that emphasis to the world of IT, a new survey has found.

BlackBerry maker Research In Motion (RIM) on Thursday announced that CESG, the National Technical Authority for Information Assurance in the UK, has given the BlackBerry 7 operating system its stamp of approval for government use, providing public sector workers the option to utilize several late model BlackBerry smartphones.

Hacktivist "Groups" Have Different Motives Behind Their Attacks, But Most Use The Same Tools That Penetration Testers and Other Security Professionals Use or Sell to Others.

Using data collected from DShield, a community based log correlation system that collects data from sensors covering more than 500,000 IP addresses in over 50 countries, the NCC Group has mapped out its latest report on the origination of computer hacking attempts for the first quarter of 2012.For the first time, the UK made an appearance in the top ten, while percentage of hacking attempts coming from Russia and the Netherlands also jumped.

For most of this week, The Pirate Bay (TPB) and Wikileaks have suffered under the pressure of a sustained DDoS attack from unknown sources. For TPB outages occur frequently, but direct attacks (other than court ordered censorship) are rare. Likewise, Wikileaks sometimes suffers outages or slow connections, but they too rarely see a direct attack.

In December of 2009, after months of waiting, the Obama Administration named Howard Schmidt as the White House Cybersecurity Coordinator. After more than forty years in the IT community, the former head of the Information Security Forum and the nation’s first cyber czar will retire at the end of the month.

ICS-CERT, the section of U.S. CERT that deals with Industrial Control Systems, is issuing an advisory after a researcher exposed four separate flaws within Pro-face Pro-server, a popular data management server that offers real-time reporting of automated manufacturing and production environments. Each of the flaws can be targeted remotely to trigger DoS conditions, or code execution.

Neustar Reports Shows DDoS Attacks Can Cost Retailers More Than $100k Per-hourAccording to NeuStar, a provider of information, infrastructure and security solutions, the effects a DDoS attack can be devastating to an organization's brand and operations. A majority (three-quarters) of the IT professionals that spoke with NeuStar for a study on the issue said that they fear negative brand impact or customer experiences because of such an attack.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.