Endpoint March 3, 2015 How to Stay Off the Data Breach List 3 min read - In the wake of several damaging incidents in 2014, organizations must implement security solutions and controls to avoid being the victim of a data breach.
Advanced Threats February 17, 2015 Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks 3 min read - A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
Software Vulnerabilities February 11, 2015 A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps 5 min read - A new IBM report details potential vulnerabilities in many popular dating apps that could negatively affect your organization's mobile security.
CISO February 5, 2015 The Evolving CISO Policy Role 2 min read - More attention is being focused on the evolving role of the CISO, who must now provide technical knowledge and help shape security policies.
January 28, 2015 Cybercriminals Threaten Data Dump From Hacked Malaysia Airlines Website 3 min read - Cybercriminals belonging to Lizard Squad have threatened to dump data from a hacked Malaysia Airlines website, though the airline refutes the claim.
CISO January 23, 2015 Should the Energy Production Industry Consider Cybersecurity? 2 min read - When it comes to keeping energy production plants safe, there must be a stronger focus on cybersecurity in light of new, sophisticated attacks.
Malware January 21, 2015 Wiper Malware Poses Destructive Threat 2 min read - Wiper malware can destroy important data and cripple computer systems. It was most recently used in the high-profile breach against Sony Pictures.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
CISO December 30, 2014 External Threats a Top Concern for CISOs 2 min read - What is the biggest challenge for CISOs today? Security leaders will continue to focus on external threats for the foreseeable future.
Incident Response December 12, 2014 Making Your Business Cyber Resilient 3 min read - With cyber attacks on the rise, what can businesses do to protect their crown jewels or assets from being breached?