Vulnerability management may be the next big thing in terms of IT security strategy, but deriving the maximum value out of your efforts requires hard work and a comprehensive plan, industry insiders recognize. Speaking at the SOURCE Boston conference this week, scanner maker Tenable Security’s Carole Fennelly outlined some of the best practices that organizations […]
The proliferation of technologies such as social networking sites and cloud computing, coupled with the ongoing economic uncertainty, is only complicating the high wire act that organizations must pull off these days to balance sustainable IT security with sufficient flexibility to support business initiatives, experts contend. At a panel held at the SOURCE Boston 2009 […]
It’s astonishing, but apparently no one wants to be the federal government’s Cyber Czar… at least not for very long. As first reported by AP yesterday, Silicon Valley entrepreneur Rod Beckstrom is walking away from the post after just a year on the job, the latest in a series of appointees to jump from the […]
Adware distributors have been tapping into the viral nature of Web 2.0 sites to fool users into downloading and even distributing their content for some time, but the activity has been ramping up in recent days, with one particular campaign taking off, according to researchers at PandaLabs. According to the badware-tracking experts, infections of the […]
Hey there soldier, how about a great deal on this cherry ’83 El Camino? Anyone who has attempted to buy or sell a car over the Web with any frequency over the last few years has likely already come across some variation on the old Nigerian scam model that targets the online automotive resale market […]
The Conficker botnet might as well have been named the Confounder botnet up until recently, but some experts think that despite the attack’s continued proliferation, there may finally be some light at the end of the tunnel. Looking at various reports highlighting Conficker’s worming propagation during the month of Feb. it’s clear that the attack […]
We’ve been threatening to punish organizations that mishandle sensitive electronic data and allow attackers to infiltrate their systems to steal consumer records for years, but here’s an interesting new idea – how about rewarding those companies who go above and beyond the norm in doing a good job with data security – with tax breaks? […]
Some might say it’s slightly self-serving for a company that sells anti-botnet technology to blame the nefarious zombie networks of infected PCs for a lion’s share of today’s cyber-attacks, but despite any reservations you might harbor to that end, it’s clear in chatting with the folks from Damballa that the effect of today’s sprawling worldwide […]
It’s a gross oversimplification of an utterly staggering technical and social challenge, and he knows it as well as anyone, but it’s hard to argue with PCI Security Standards Council General Manager Bob Russo’s assertion that when it comes to improving electronic data security and related matters of individual privacy, “something is much better than […]
A new research report delving further into the current epidemic of online SQL injection attacks maintains that over a half million sites were victimized by the threats during 2008 alone. According to the Web Hacking Incidents Database (WHID) 2008 Annual Report issued by security appliance maker Breach Security on Tuesday, SQL threats that dropped malware […]