Corporate Partners

Top IT Security Bloggers

  • More ATM “Insert Skimmer” Innovations

    Krebs on Security
    Most of us know to keep our guard up when withdrawing cash from an ATM and to look for any signs that the machine may have been tampered with. But ATM fraud experts say they continue to see criminal innovations with "insert skimmers," wafer-thin data theft devices that fit inside the ATM's card acceptance slot and do not alter the outward appearance of a compromised cash machine.
  • Children's apps and websites raise privacy concerns

    Sophos - Naked Security
    Members of the Global Privacy Enforcement Network say many kids' websites and apps collect and share too much personal information.
  • Don’t Fall for Ticket Scams this Fall

    Trend Micro - Cloud Security Blog
    The law of supply and demand is a fundamental concept of economic theory. As such, it’s at the heart of the cybercrime underground and the black market economy that fuels it. Whenever there is surging demand for limited products or scarce services, you can bet that cybercriminals will be quick to exploit it for their...
  • Should the US hit China with sanctions over cyberespionage?

    Sophos - Naked Security
    The Obama administration is developing economic sanctions against China for cyberespionage against US companies. Are sanctions likely to succeed in deterring China? Or will they only invite retaliation that will damage the world economy?
  • How a simple email error revealed the identities of hundreds of HIV patients

    Graham Cluley
    A sexual health clinic in Soho, London, is the latest organisation to fall foul of the all-too-common CC/BCC error.
  • If you look after the Large Hadron Collider you should read this...

    Graham Cluley
    Vulnerabilities in Siemens industrial control systems discovered.
    You think you had a headache keeping your home computer updated with security patches? Just imagine if you were responsible for securing the Large Hadron Collider or a nuclear plant...
  • Unsolved cipher mystery: Spaniard says he's cracked Dead Pigeon code

    Sophos - Naked Security
    A pigeon skeleton from WW2 with a coded message strapped to its leg was found in England in 2012.

    The challenge: unscramble the message!
  • Google accused of rigging search results by India's competition cops

    Sophos - Naked Security
    "Yep, Google's a search bully," agree Facebook, Nokia's maps division, MakeMy-Trip.com, Flipkart and several other companies.
  • Wikipedia blocks sockpuppet accounts amid blackmail claims

    Sophos - Naked Security
    As part of an internal investigation, the Wikimedia Foundation found that rogue editors had violated its terms of use by creating new pages, as well as modifying existing ones for the purposes of financial gain.
  • The RMS Titanic and cybersecurity

    Network World - Networking Nuggets and Security Snippets
    Little known fact: Yesterday was the 30th anniversary of Bob Ballard’s discovery of the RMS Titanic, several hundred miles off the coast of Newfoundland Canada. I’ve recently done some research into the ship, its builders, and its ultimate fate and believe that lessons learned from Titanic may be useful for the cybersecurity community at large. The Titanic tragedy teaches us of:
    The dangers of technology hubris. The Titanic was designed with the latest technology at the time to withstand severe storms in the north Atlantic. Because of this, the shipbuilders at Harland and Wolff decided to market the ship as “unsinkable.” Likewise, our industry has this absolute love affair with technology. I’m constantly briefed on the latest and greatest prevention or detection engine designed to withstand anything hackers can throw at it. Like the “unsinkable” Titanic, this is nothing but hot air. Bad guys will find ways around all of our defenses over time. Strong security demands people, process, and technology so the industry love affair with technology alone is counterproductive and leaves us susceptible to a sea of cybersecurity icebergs.
    The need for organizational coordination. There were two inquiries into the Titanic disaster, one in the U.S. and one in England. In both cases, investigators learned that the crew of the Titanic was inexperienced and various groups that made up the Titanic’s staff did not work well together. This lack of coordination could have contributed to the disaster. Similarly, strong cybersecurity depends on a collaborative effort between cybersecurity professionals, business management, and different IT groups (i.e. IT operations, DevOps, data center infrastructure, etc.). A lack of cooperation could also lead to disastrous results.
    Tradeoffs between business objectives versus risk management. A man named Thomas Andrews was tasked with the Titanic’s overall design and construction. Andrews wanted 64 life boats to guarantee space for all passengers, but the management of Harland and Wolff didn’t want to waste precious space on the promenade deck, so higher-ups decided to go with the legally acceptable minimum – 16 lifeboats (and 4 tenders). The rest, as they say, is history. Similarly, business managers often go full-speed ahead with business initiatives without considering cybersecurity risks. Alternatively, they minimize cybersecurity investment, eschewing good security for “good enough” security. The lesson here? Don’t make blind or best-case risk management assumptions or you could hit an iceberg that is much larger than you think.

    There are plenty of other lessons I could come up with but I’m sure you get my point.  Organizations should approach cybersecurity with humility, reality, and a comprehensive team effort.  In lieu of this end-to-end approach, CEOs shouldn’t be surprised when their organizations suffer data breaches, their stock prices sink, and their careers end up in Davy Jones’ locker.  To read this article in full or to leave a comment, please click here

Market Place