Blog Archives

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

The Hackers Who Grinched Christmas

Kids’ smart toys are big holiday targets for hackers

 by: Mark Pribish, VP / ID Theft Practice Leader – MIS, Inc.

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Malware, Risk Management
Tags: , , , , , , , ,

Protecting your Business Against Insider Threats

Insider Threat: Protecting Your Business and Your Data

Businesses today thrive on connectivity. However, easily/remotely accessible networks come with numerous well-documented security risks, particularly from malicious cyber attacks.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , , ,

Inside Threat – Awareness Is Key

The Problem: New Times. New Crimes. Same Inside Threat.

For the financial industry, prospects for an “inside job” have existed as long as there have been banks – with every, single incident linked by one thematic thread: information.

Before the Digital Age, individual crooks, gangs or even major syndicates cultivated alliances with disgruntled bank tellers,

Read more ›

Posted in Breach, Compliance, Content, Continuous Monitoring, Cybersecurity, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , ,

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

The Threat of the Malicious Insider

The Malicious Insider is already inside your defenses. How do you detect and defeat them?

by , Tripwire

Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse  defined as any unapproved or malicious use of organization resources in last year’s Verizon Data Breach Investigations Report.

Read more ›

Posted in Cybersecurity, Hacks, Incident Response, Insider Threats, Legal, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , , , , , , ,

GHOST and Second Look

What is GHOST and How Can Second Look Protect You?

The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.

Read more ›

Posted in Compliance, Cyberattack, Cybersecurity, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Hacking is Business, and Business is Good – Cybersecurity Myths

Debunking The Biggest Cybersecurity Myths for Businesses

by Rick Delgado, by way of TripWire

A glimpse at the world of cybersecurity can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Read more ›

Posted in Breach, Cyberattack, Cybersecurity, Hacks, Incident Response, Insider Threats, Legal, Regulatory, Risk Management
Tags: , , , , , , , , , , , , ,

Sony Cyberattack: The Importance of Defense in Depth

Sony Cyberattack Reflects Risk of ‘Single Points of Failure’

by Steve Rosenbush, WSJ

The cyberattack at Sony Pictures Entertainment “represents a kind of seismic shift” in the techniques and motivations attackers use, Greg Bell, the U.S. leader for cyber services and information protection at KPMG, tells CIO Journal’s Rachael King and Steven Norton.

Read more ›

Posted in Breach, Content, Cyberattack, Cybersecurity, Hacks, Malware, Oops, Trojan
Tags: , , , , , , , , , , , , , ,

Chinese CyberEspionage A Growing Threat

Chinese CyberEspionage on the Rise in US, Experts Warn

by: Jennifer Schlesinger,  CNBC

The Chinese are working feverishly to counteract their slowest GDP growth in recent years, and one of the ways they’re doing so, say U.S. officials, is through the theft of American corporate secrets.

Read more ›

Posted in Breach, Cyberattack, Cybersecurity, Encryption, Governent Oversight, Hacks, Incident Response, Malware & Other Threats, Trojan
Tags: , , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: