Perimeter defenses deemed ineffective against modern security threats
Item One: For Leslie Lambert, former CISO at Sun Microsystems who recently joined Juniper Networks Inc. as CISO, assuming that the bad actors behind cybersecurity threats are already inside the network...
View ArticlePathetic Analytics Epiphany!
Some years ago, I read that the next big shift in web development would be from hand-coding HTML (and everything that goes with webpages) to WYSIWYG editors doing all the coding behind the scenes....
View ArticleDefense Department Confirms Critical Cyber Attack – Security from eWeek
Details on an old DoD break-in. I wonder if the activity of the malware was logged anywhere? In an article for Foreign Affairs, Deputy Defense Secretary William J. Lynn III writes that in 2008, a...
View ArticleFacebook, Google Chat Used as Control Sites for Malware Attackers
While it isn’t exactly groundbreaking news that malware attackers are using social media to control their botnets, certain aspects are notable: In each of these cases, the attackers’ remote activity...
View ArticleVerizon 2011 Data Breach Investigations Report released
Here we are again – our fourth installment of the DBIR series (sixth if you count the ’08 and ’09 mid-year supplementals). To our readers, it may seem like the 2010 DBIR published ages ago. To us, it...
View Article
More Pages to Explore .....