The Latest in IT Security

minus
  • img
  • img
  • img
plus

Categories

TUESDAY, OCTOBER 17, 2017

Featured

Archives

Latest Comments

Social Networks

Defenders face creative adversaries who are constantly evolving their attack arsenal. To help the good guys know what they’re up against, here are some of the attack vectors that have been frequently used in recent months. Some of these vectors – like fileless malware attacks and ransomware – are likely well-known to security professionals. But […]

Read more ...

David Kent sold his social network Rigzone to Dice, created a competing company, hacked the first company to build up the new company, then tried to sell the new company to Dice. Instead, Kent faces a year and a day in federal prison for repeatedly hacking into a computer database to which he was not […]

Read more ...

“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been breached before…” “The risk of it happening is so small and it’s hard to quantify…” These are some of the most common excuses companies give for delaying their security and compliance efforts. But,given […]

Read more ...

One of many concerning security trends from 2017 is the accidental exposure of cloud data via misconfigured Simple Storage Service (S3) buckets from Amazon Web Services. This year has been marked with several data leaks from major organizations, most recently Accenture. “While this incident is very unfortunate, it’s not very surprising,” says RedLock cofounder and […]

Read more ...

If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says there are four important steps that will bolster college and university cybersecurity plans. Read More

Read more ...