Intelligence & Analytics April 1, 2015 The Power of Community Defense: Using a Combination of Threat Intelligence, Information Sharing and Open Standards 2 min read - Using community defense, organizations can band together to promote increased information sharing to alert others about potentially dangerous threats.
Application Security March 31, 2015 Mobility and IoT Security: Why Manufacturers Need to Change Their Mindset 3 min read - With the rise of wearables, the expansion of the smart-home ecosystem and the advent of driverless cars, IoT security should no longer be an afterthought.
March 31, 2015 Uber Security Breach: User Accounts Taken For a Ride? 2 min read - A recent alleged Uber security breach has led to stolen user accounts being sold on the Dark Web for as little as $1. However, Uber denies the breach.
Government March 31, 2015 US State Department Hack Has Major Security Implications 2 min read - The U.S. State Department is the latest government agency to be targeted by cybercriminals, with a phishing email leading to a breach of the network.
Intelligence & Analytics March 30, 2015 Malware Analysis: Investigating the Right Security Alerts 3 min read - Security professionals waste time and money choosing which security alerts to investigate. Automation is a great way to track and analyze threats.
Endpoint March 30, 2015 From Health Care to Health Crisis: A Consumer’s Perspective on Health System Breaches and Stolen Customer Data 3 min read - After being the victim of a health system breach that stole my customer data, I realized organizations need to invest in a threat protection system.
March 27, 2015 Vawtrak Variant Uses Favicons to Hide Dangerous Malware Files 2 min read - Security researchers say a new form of the Vawtrak malware could be worse than ever before, accessing bank accounts and stealing passwords.
Government March 27, 2015 US Government to Establish Cyber Threat Intelligence Integration Center 2 min read - The U.S. government has established the Cyber Threat Intelligence Integration Center to inform policymakers and government agencies of cyberthreats.
Endpoint March 27, 2015 Moving Ahead With BYOD: How to Stay Secure 3 min read - As more and more organizations adopt BYOD, it is important to implement security policies that will keep corporate information in the right hands.
Mainframe March 26, 2015 How STIX, TAXII and CybOX Can Help With Standardizing Threat Information 6 min read - As the security threat landscape evolves, organizations should consider using STIX, TAXII and CybOX to help with standardizing threat information.