Top Five Myths of Security Awareness
Not the best, but its a good summary of things that can be done for User Awareness. If an attacker tries enough times, he will even trick the most highly trained individuals. But risk is all about...
View ArticleGlobal Risk 2011
Last week, the World Economic Forum (WEF) published sixth edition of Global Risks 2011. For those who are wondering what does WEF have to do with IT Risk Management….the report is not about technology...
View ArticleComputer Takeover Alert!
Will this stop the multiplication of bots? Online customers, he said, may not want their service provider to cut off their Internet access if their computer is infected. And they may balk at being...
View ArticleQuantifying current state of cybercrime
Just two weeks ago, we all saw the end of an era when DHS annouced that the color coded threat system will be phased out and replaced with new system known as National Terrorism Advisory System. Today,...
View ArticleCybersecurity Education Strategic Plan
Ispitzner / SecuringTheHuman Blog NIST (the US National Institute of Standards and Technology) recently published a draft version on its strategy for promoting cyber security awareness and education....
View ArticleA tool to identify malicious insiders
William Jackson / GCN The system, which is being tested in a lab environment, uses a host-based agent to “learn” a user’s behavior and to look for anomalous behavior or other signatures, said computer...
View ArticleAPT Or Not APT? Depends upon how clear the patterns are!
Rober Lemos / Dark Reading Separating persistent threats from more opportunistic cybercrime-focused attacks is not easy, but can help inform defense, according to security experts. Block an...
View Article
More Pages to Explore .....