CISO January 23, 2015 Should the Energy Production Industry Consider Cybersecurity? 2 min read - When it comes to keeping energy production plants safe, there must be a stronger focus on cybersecurity in light of new, sophisticated attacks.
Malware January 21, 2015 Wiper Malware Poses Destructive Threat 2 min read - Wiper malware can destroy important data and cripple computer systems. It was most recently used in the high-profile breach against Sony Pictures.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
CISO December 30, 2014 External Threats a Top Concern for CISOs 2 min read - What is the biggest challenge for CISOs today? Security leaders will continue to focus on external threats for the foreseeable future.
Incident Response December 12, 2014 Making Your Business Cyber Resilient 3 min read - With cyber attacks on the rise, what can businesses do to protect their crown jewels or assets from being breached?
December 10, 2014 Major Websites Remain Vulnerable to POODLE Attack 3 min read - Many major websites are still vulnerable to the POODLE attack, which now works against certain Transport Layer Security (TLS) implementations.
December 3, 2014 FBI Warns US Businesses of Destructive Data-Wiping Malware 3 min read - According to the FBI, businesses should watch out for a particularly destructive type of malware that is capable of wiping out data on infected systems.
December 2, 2014 Sony Pictures Hack: Films, Executive Pay Leaked Online as Fallout Escalates 2 min read - The Sony Pictures hack that was reported last week may now have spread from internal damage to data theft of intellectual property and more.
November 26, 2014 Cybercriminals Took Down Sony Pictures Entertainment’s Network, Reports Claim 2 min read - Several reports claim Sony Pictures Entertainment's internal network was attacked by cybercriminals making unspecified demands in exchange for stolen data.
October 20, 2014 POODLE Attack Packs a Bite 2 min read - The innocuously named POODLE attack disclosed by security researchers at Google this week demonstrates the dangers of supporting obsolete technology.