December, 2015

article thumbnail

OS X El Capitan: The smart person's guide

Tech Republic Security

This comprehensive guide includes everything you need to know about Apple's OS X El Capitan, including features, requirements, upgrade options, software updates, and more.

Software 111
article thumbnail

The Importance of Technology Integration to the Value of an InfoSec product

NopSec

According to FireEye, a U.S. based provider of next generation threat protection, it takes companies, on average, more than 200 days to detect they are being hacked. Couple that result with the 2015 Verizon Data Breach Investigations Report that found 99.9 percent of vulnerabilities were exploited over a year since they were disclosed, and you can see that protecting data from hackers is in a sublime state of disrepair.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

article thumbnail

The TPP Agreement and Privacy

Privacy and Cybersecurity Law

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries […].

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Criminal Services – Crypting

Digital Shadows

In the world of cybercrime, malicious software (malware) plays an important role. But if you’re a cybercriminal, how do you. The post Criminal Services – Crypting first appeared on Digital Shadows.

article thumbnail

Docker-based OpenVAS Scanning Cluster to Improve Scope Scalability

NopSec

OpenVAS (Open Vulnerability Assessment Scanner) – is an open source security vulnerability scanner and manager. It is an open source fork of the commercial vulnerability scanner Nessus and it provides several options to manage distributed, remote, local scans and add several other specialized vulnerability scanners to the mix. Since OpenVAS 8 was released with improved Master-Slave support for better distributed and load-balanced scanning, NopSec decided to build a proof of concept securit

LifeWorks

More Trending

article thumbnail

‘Hacker Buba’: Failed extortion, what next?

Digital Shadows

An actor identifying itself as “Hacker Buba” recently claimed to have breached Invest Bank and posted purported customer and client. The post ‘Hacker Buba’: Failed extortion, what next? first appeared on Digital Shadows.

Banking 40
article thumbnail

Communicating Intelligence: The Challenge of Consumption

Digital Shadows

In my previous blog in this series I discussed the challenge of effectively communicating intelligence, and provided examples of how. The post Communicating Intelligence: The Challenge of Consumption first appeared on Digital Shadows.

40
article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.” In an age where data breaches crowd the daily headlines, lack of awareness is no longer an excuse for executives.

article thumbnail

Communicating Intelligence: Getting the message out

Digital Shadows

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll. The post Communicating Intelligence: Getting the message out first appeared on Digital Shadows.

40
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

TalkTalk Information Likely to be Discoverable on The Dark Web

Digital Shadows

Last month, TalkTalk disclosed that they been the victim of a cyber attack on its website. Initial disclosures indicated that. The post TalkTalk Information Likely to be Discoverable on The Dark Web first appeared on Digital Shadows.

article thumbnail

Communicating Intelligence: A Battle of Three Sides

Digital Shadows

Good intelligence depends in large measure on clear, concise writing. -Fran Moore, Director for Analysis, Central Intelligence Agency (2011) I’m. The post Communicating Intelligence: A Battle of Three Sides first appeared on Digital Shadows.

40
article thumbnail

New guidance from the Polish DPA: a warning for all Safe Habor (ex)participants

Privacy and Cybersecurity Law

The Polish DPA has recently issued a statement to the effect that all companies which previously relied on Safe Harbor […].

40
article thumbnail

Safe Harbor fallout: where are we now?

Privacy and Cybersecurity Law

As we all know, the EU decided to invalidate Safe Harbor on 6 October 2015. Please see our Insight article […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Canada’s role in international botnet takedown

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has served its first warrant under Canada’s Anti-Spam Law (CASL) to take down […].