Government April 16, 2015 Federal Cybersecurity Legislation Is on the Way — But Don’t Relax 3 min read - As cybersecurity incidents increase in frequency and severity, new legislation is being proposed to share information among organizations.
April 3, 2015 DDoS Made Deadlier: Multicast DNS Vulnerability Could Affect More Than 100,000 Devices 2 min read - According to CERT, a miconfiguration in many devices could mean cybercriminals can exploit a multicast DNS vulnerability, making DDoS attacks worse.
Data Protection March 4, 2015 Data Security: How Vulnerable Is Your Critical Data? 2 min read - Data security today requires a holistic approach that caters to customer concerns and leverages cloud, mobile, social and big data with confidence.
Endpoint February 28, 2015 Could Your SSH Keys Become Stolen Credentials? 3 min read - SSH keys are valuable to cybercriminals because stolen credentials can be used to access critical servers. Here are some facts regarding the issue.
January 12, 2015 Pastebin a Convenient Way for Cybercriminals to Remotely Host Malware 2 min read - Experts say cybercriminals are using a popular online repository called Pastebin to act as a remote server for hosting malware aimed at WordPress users.