Items Tagged with 'hackers'

ARTICLES

4 Challenges to Address in Corporate Cyber War

We are fighting a cyber war and need to take proactive steps to protect ourselves and our companies as the virtual bullets fly.
By David Elfering and Ron Woerner
No Comments

Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.


Read More

Cyber Crime Costs Global Economy $445 Billion a Year

No Comments

A new report from the Center for Strategic and International Studies (CSIS) and sponsored by McAfee, says that cybercrime costs businesses approximately $400 billion worldwide, with an impact on approximately 200,000 jobs in the U.S. and 150,000 jobs in the EU.


Read More

Hackers Face Life Sentences in Britain

No Comments

The UK government said it wants to hand out life sentences to anyone found guilty of a cyberattack that has a catastrophic effect.


Read More

Senior Managers Pose Greatest Risk to Cyber Security

No Comments

A new study shows senior managers account for some of the greatest security risks because they are prone to take work, and thus security vulnerabilities, home with them.


Read More

Snapchat, Skype Fall Prey to Security Breaches

No Comments

Several million Snapchat usernames and phone numbers were apparently leaked online late Dec., 31, 2013. Several outlets reported that 4.6 million usernames and phone numbers were posted as a downloadable database by hackers, but the site where the database was posted appeared to be down on Wednesday morning, USA Today reports.


Read More

Report: 42 Million Records Stolen from Online Dating Network

No Comments

Hackers reportedly stole 42 million customer records, including email addresses and clear-text passwords, from Cupid Media’s network of dating websites. A file containing the Cupid Media user data was found on the same server where hackers also stored millions of records stolen from Adobe, PR Newswire, the U.S. National White Collar Crime Center and other organizations.


Read More

Hackers Steal Identity Info of 72,000 at U of Delaware

No Comments

A cyberattack on a University of Delaware computer system exposed more than 72,000 people to identity theft and could cost the school millions of dollars.


Read More

Are Public-Private Cyber Partnerships Worth the Effort?

Fifteen years after the start of the Information Sharing and Analysis Center, what have you gained?
No Comments

Fifteen years after the start of the Information Sharing and Analysis Center, what have you gained?


Read More

Study Says Most Small Businesses Don't Recover From Cybercrime

No Comments

A recent study by ClikCloud found though more than three-quarters of small businesses believe their companies are safe from hackers, 20% of all cyberattacks hit small businesses with 250 or fewer employees.

 


Read More

"Zombie Apocalypse" Hack Reveals TV Vulnerability

No Comments

As the Emergency Alert System reported an imminent zombie attack last week, broadcasters started to realize it was time to change their passwords... and maybe more.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+