The most recent content from our members.
This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What assets are in play? Are best practices and industry recommendations in place? Am I making the best use of existing infrastructure? The more questions…
Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which is in the throes of a ransomware-related recovery. Complicating the recovery mission is the fact that the city’s IT team didn't know when the systems were compromised initially. They knew when the systems went offline, but not if the…
Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor for the U.S. Department of Defense, I view information security through the lens that protecting national security and keeping lives safe is the priority.…
Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at the previous posts. Post #1: When "Trust but Verify" Isn’t…
2014 is around the corner, and every organization is gearing up to face all the new types of threats, malware attacks, other cyber-crimes including data loss and identity theft which are getting more advanced and difficult to tackle. Let’s take a dive into what the industry experts are saying about the emergence of new…
According to a recent Pew poll, American users are more afraid of "cyber attacks" than world-impacting threats, like nuclear weapons. Granted, you are more likely to get your credit card number stolen than someone is likely to push the big, red nuclear button of doom, but that's like being more afraid of being…
Since the inception of PCI DSS, organizations have put a number of protective mechanisms into place. As retailers, card processors and other PCI-DSS covered entities have evolved their security mechanisms – so has the hacking community. Credit card information can sell for a considerable sum in online black markets, and it…
Hackers Steal 2 Million Usernames & Passwords from Social Networking Sites including Google, Facebook, Twitter and LinkedIn This is a whale of a heist. All the social network stalwarts have been outsmarted by hackers. Security experts at Trustwaves SpiderLabs have discovered a trove of 2 million hacked social network user…
Penetration testing or pen testing is a cool job. I’m telling you this before even we take a look at what it is and how it can be done. It’s a kind of white hat hacking practice. Another wacky jargon? Trust me that’s a cool job too. Now, really how many of us will want to get paid legitimately for hacking? This simply…
Those of you in IT administration (particularly IT security) know the challenges involved with protecting corporate data stored in your network. You also know that you regularly face an onslaught of new and sophisticated hacking methods, malware, and other threats. It is an uphill task to safeguard data—especially the…
It looks like you're new here. Sign in or register to get started.