Specialist from NIST shares small business cyber security fundamentals

A computer security specialist from the National Institute of Standards and Technology (NIST) recently addressed a gathering of small and mid-sized business people at the 2015 Cyber Security Summit in Minneapolis. The speaker, Patricia Toth, told her audience that small businesses are vulnerable and are increasingly the target of malicious attacks from cyber hackers. In 2013, 31 percent of cyberattacks targeted […]

Read more

Experts tout info-sharing as best cyber defense

Cyberattacks have rocked American industry, U.S. government agencies, academic institutions and others causing disruptions of service, sensitive information leaks and theft of trade secrets and military defense documents. News reports detail accounts of breaches at major companies and even the federal government, resulting in the loss of customers’ private information. Any industry engaged in digital communication […]

Read more

Survey: Organization’s size doesn’t indicate its “security maturity”

Regardless of size, nearly three-quarters of companies lack the maturity to address cyber security risks, according to the inaugural “Cybersecurity Poverty Index” released by RSA, The Security Division of EMC. The index compiled survey results from more than 400 security professionals across 61 countries. Participants self-assessed the maturity of their cyber security programs against the […]

Read more

4 Tips for Involving Legal Counsel in Cyber Security Investigations

Most companies recognize that a cyber attack will require the company to engage outside counsel. But, do you know what that engagement should encompass, what role outside counsel should play, or what benefits can be gained by managing the relationship effectively? Trust me – you do not want to discover the answers to these questions […]

Read more

Cyber Security Summit Chair discusses securing your infrastructure

Andrew Borene, chair of the 2015 Cyber Security Summit, spoke about securing your company’s infrastructure yesterday at an event hosted by The Center for National Policy and The Christian Science Monitor. You can view his full comments below. Borene is federal chief strategist at IBM for i2 Intelligence Analysis. You can read more on his presentation from the Christian Science Monitor: Transforming overwhelming […]

Read more

President Obama delivers cyber security remarks at Stanford

Earlier today, President Obama delivered remarks at the Cybersecurity and Consumer Protection Summit at Stanford University. During his speech, he also signed an executive order promoting information sharing on cyber security threats between the private sector and government agencies. “This is not a Democratic issue, or a Republican issue,” he said during his speech. “This is not a […]

Read more

Report: More than 88 percent of cloud apps not enterprise ready

Compromised credentials are frequently being used in enterprise cloud apps, putting sensitive business information at risk, according to a report released today by cloud app analytics company Netskope. The report says as many as 15 percent of corporate users have had their account credentials stolen. Since many users reuse the same credentials across multiple accounts, […]

Read more

New report predicts rise in targeted attacks, online banking crime

In a new cyber crime report released last week, IT security provider Trend Micro makes a number of predictions for 2015 and beyond, including a rise in targeted attacks and an increase in the severity of online banking and other financially motivated attacks. “The growing risks online banking threats pose should motivate individuals and organizations alike […]

Read more

Home Depot provides update on data breach investigation

Home improvement retailer The Home Depot, which revealed in September that its payment data systems had been breached, has disclosed additional information related to the company’s recent hacking incident. The findings are the result of investigations in cooperation with law enforcement and third-party IT security experts. The big revelation in the latest update is that, in addition to credit card data, […]

Read more

IBM releases product suite that aims to secure the cloud

IBM is putting added emphasis on its cyber security business, and yesterday the company announced a new suite of products and services designed to help secure cloud environments. The company said its new Dynamic Cloud Security portfolio addresses security gaps that can exist between on-premise, cloud, software-as-a-service and mobile applications. “Customers are now moving critical workloads to the […]

Read more

Raytheon buys cyber security provider Blackbird Technologies for $420 million

American defense contractor Raytheon reported today that it is beefing up its cyber capabilities with the acquisition of Blackbird Technologies, a Virginia-based provider of persistent surveillance, secure tactical communications, and cyber security solutions to the Intelligence Community and special operations market. The total cost will be approximately $420 million, Raytheon says. Blackbird currently supports customers in the […]

Read more