Corporate Partners

Top IT Security Bloggers

  • Banks: Credit Card Breach at P.F. Chang’s

    Krebs on Security
    Nationwide chain P.F. Chang's China Bistro said today that it is investigating claims of a data breach involving credit and debit card data reportedly stolen from restaurant locations nationwide.
  • Microsoft Patch Tuesday – June 2014

    Symantec Security Response Blogs
    Summary: 


    This month the vendor is releasing seven bulletins covering a total of 66 vulnerabilities. Fifty-five of this month's issues are rated ’Critical’.




    Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing seven bulletins covering a total of 66 vulnerabilities. Fifty-five of this month's issues are rated ’Critical’.
    As always, customers are advised to follow these security best practices:
    read more
  • Big data security analytics can become the nexus of information security integration

    Network World - Networking Nuggets and Security Snippets
    In a recent ESG research survey (note: I am an employee of ESG), security professionals working at enterprise organizations (i.e. more than 1,000 employees) were asked the following question: How do you believe that your organization will change its security technology strategy decisions in any of the following ways over the next 24 months in order to improve its security management?In response:
    44% said that they planned to “design and build a more integrated security architecture.” In other words, they want central configuration management, policy management, and reporting for different security technologies.
    39% said that they planned to “include new data sources for security intelligence.” This means that they plan to collect more internal data from networks, applications, and security devices and also consume more external threat intelligence from existing security vendors or innovative newcomers like BitSight, Norse, and Vorstack.

    These are worthwhile plans, but there is still a slight problem with the first initiative – building an integrated enterprise security architecture could take years as large organizations replace existing products as they are fully amortized and integrate them together through some common APIs and middleware. In the meantime, they will have to manage enterprise security through an army of point tools and manual processes.To read this article in full or to leave a comment, please click here
  • Adobe, Microsoft Push Critical Security Fixes

    Krebs on Security
    Adobe and Microsoft today each released updates to fix critical security vulnerabilities in their software. Adobe issued patches for Flash Player and AIR, while Microsoft's Patch Tuesday batch includes seven update bundles to address a whopping 66 distinct security holes in Windows and related products.
  • Moscow hacking duo confess to hijacking and locking Apple devices

    Graham Cluley
    Authorities in Russia have secured a confession from two young hackers who were allegedly hijacked Apple devices and held their owners to digital ransom.

    Read my article on the Mac Security blog.
  • Targeted Attack Methodologies for Cybercrime

    TrendLabs - Malware Blog
    We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack’s intent. With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of “tools”, as these campaigns are all about who carries out the attack. Ultimately, a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attack Methodologies for Cybercrime
  • Targeted Attack Methodologies for Cybercrime

    Trend Micro - Security Intelligence
    We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack’s intent. With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of “tools”, as these campaigns are all about who carries out the attack. Ultimately, a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attack Methodologies for Cybercrime
  • "Turing Test" allegedly defeated - is it time to welcome your robot overlords?

    Sophos - Naked Security
    There's a lot of hype around the news that a computer has passed the "Turing Test" at last.

    But what is a Turing Test, and what does it teach us?

    Paul Ducklin digs into the story behind the story...
  • This woman has made her own bad password dress… and a security blanket

    Graham Cluley
    Disappointingly for pun-writers, Lorrie Faith Cranor isn't wearing any passwords on her sleeve.
  • Ransom-taking iPhone hackers busted by Russian authorities

    Sophos - Naked Security
    The mystery of the ransom messages from "Oleg Pliss," and the iDevice locking attack that popped up in Australia and the US last month, appears to have been solved.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place