Thursday March 26th 2015
5 Biggest Cyber Security Mistakes Show the Need for Automated Defenses

5 Biggest Cyber Security Mistakes Show the Need for Automated Defenses

As a cyber security software vendor, we’ve conducted many risk assessments for enterprises. Over the years we’ve seen some egregious security faux pas, [...]

Sony Pictures Data Breach Shows Missing Last Line of Cyber Defense

Sony Pictures Data Breach Shows Missing Last Line of Cyber Defense

The Sony Pictures data breach cast a media spotlight on just how unprepared many large organizations are for today’s advanced cyber threats. Suddenly, 60 [...]

Force Majeure – Cyber Security Insurance

Force Majeure – Cyber Security Insurance

As we look back on the cyber attacks of the past year, one recurring theme was that there was no way the hacked companies could have expected or prevented the [...]

Equation, the NSA and Cyber Espionage

Equation, the NSA and Cyber Espionage

I’m always amazed when 20 year old exploits become news. Having said that, last week’s furor around the Equation cyber espionage group, detailed by [...]

Cyber Security: Scare Tactics and Reality

Cyber Security: Scare Tactics and Reality

It’s been said: never let a good crisis go to waste. And when it comes to recent data breaches at some of the biggest names in business, the media has [...]

Zero Day Attacks and Implications

Zero Day Attacks and Implications

“On any given day, nation-states and criminal hackers have access to an entire arsenal of zero-day vulnerabilities — undocumented and unpatched software [...]

Data Security: Is Some Information Too Sensitive to Trust to Computers?

Data Security: Is Some Information Too Sensitive to Trust to Computers?

For the past year or so, we’ve all witnessed a series of staggering data breaches among some of the biggest names in business – with each breach seemingly [...]

Remedy Poor Legacy Security Decisions with These Tips to Improve IT Security Posture

Remedy Poor Legacy Security Decisions with These Tips to Improve IT Security Posture

A friend of mine at Microsoft recently said, “There are two types of IT administrators - those who know that their systems have been attacked and owned, and [...]

Sony Pictures, North Korea and the Missing Pieces

Sony Pictures, North Korea and the Missing Pieces

More than a month after the Sony Pictures hack raised the threat of nation-state cyber attacks into mainstream consciousness, the controversy over North [...]

Software Vulnerability Alerts Create Their Own Security Risks

Software Vulnerability Alerts Create Their Own Security Risks

This week’s announcement that Microsoft is changing how Advance Notification Service (ANS) distributes patch alerts to customers was met with some [...]

 Page 1 of 28  1  2  3  4  5 » ...  Last »