Friday February 27th 2015
Equation, the NSA and Cyber Espionage

Equation, the NSA and Cyber Espionage

I’m always amazed when 20 year old exploits become news. Having said that, last week’s furor around the Equation cyber espionage group, detailed by [...]

Cyber Security: Scare Tactics and Reality

Cyber Security: Scare Tactics and Reality

It’s been said: never let a good crisis go to waste. And when it comes to recent data breaches at some of the biggest names in business, the media has [...]

Zero Day Attacks and Implications

Zero Day Attacks and Implications

“On any given day, nation-states and criminal hackers have access to an entire arsenal of zero-day vulnerabilities — undocumented and unpatched software [...]

Data Security: Is Some Information Too Sensitive to Trust to Computers?

Data Security: Is Some Information Too Sensitive to Trust to Computers?

For the past year or so, we’ve all witnessed a series of staggering data breaches among some of the biggest names in business – with each breach seemingly [...]

Remedy Poor Legacy Security Decisions with These Tips to Improve IT Security Posture

Remedy Poor Legacy Security Decisions with These Tips to Improve IT Security Posture

A friend of mine at Microsoft recently said, “There are two types of IT administrators - those who know that their systems have been attacked and owned, and [...]

Sony Pictures, North Korea and the Missing Pieces

Sony Pictures, North Korea and the Missing Pieces

More than a month after the Sony Pictures hack raised the threat of nation-state cyber attacks into mainstream consciousness, the controversy over North [...]

Software Vulnerability Alerts Create Their Own Security Risks

Software Vulnerability Alerts Create Their Own Security Risks

This week’s announcement that Microsoft is changing how Advance Notification Service (ANS) distributes patch alerts to customers was met with some [...]

Top Privilege Management Trends in 2014

Top Privilege Management Trends in 2014

2014 brought us the now infamous Sony Pictures and Home Depot hacks, as well as the immediate after affects of last year’s Target breach. Subsequently, 2014 [...]

The Annual Holiday Season IT Implementation Freeze

The Annual Holiday Season IT Implementation Freeze

We’re two days away from the Thanksgiving holiday here in the US, which means we’re on the verge of the annual holiday shopping season - kicked off by the [...]

 Page 1 of 28  1  2  3  4  5 » ...  Last »