The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Chief security and information officers beware: IT professionals are using personal email accounts to mask file transfer activity from management, according to a study released today by Ipswitch, Inc., the
Cybersecurity is a challenge that we face together. It’s important to talk about that challenge, what can be done about it, and, importantly, who should do the work. In 1990,
Based on intelligence indicating that Al Qaeda and associated movements continue to express interest in attacking U.S. mass transit systems, the Government Accountability Office (GAO) has issued a redacted version
At the Black Hat conference in Las Vegas this week, IOActive’s director of security research gave a demonstration of how he learned to crack the security of various standalone ATMs
FREE Webinar from Moog Quikset on July 27!With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection, surveillance,
FREE Webinar from Moog Quikset on July 27! With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection,
A Troy, Michigan couple faces charges of stealing industrial secrets on hybrid cars from GM before attempting to sell the data to a Chinese auto manufacturer. A former GM worker
Already an MO for some bank robbers, businesses now are reporting getting a call that there is a bomb in their facility from a person who then requests money to
The chief of the Federal Deposit Insurance Corporation’s Cyber Fraud and Financial Crimes Section recently released his top five list of fraud threats of concern to the FDIC: 1. Malware
The chair of a House subcommittee, and the chair of the House Committee on Energy and Commerce introduced H.R. 5820, the Toxic Chemicals Safety Act of 2010. “The introduction of