Podcast: Play in new window | Download | Embed
Subscribe: RSS
https://www.cooley.com/california-attorney-general-2016-data-breach-report
http://www.oreilly.com/security/newsletter
http://conferences.oreilly.com/security/network-data-security-ny
Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.securityweek.com/we-cant-give-preventing-breaches
Podcast: Play in new window | Download | Embed
Subscribe: RSS
[1] Recovering from a hacked website
[2] Albertson’s and Supervalu hacked
[3] VNC everywhere!!!!
[4] HTTPS as a solution to network injection appliances
[5] Tennessee company sues its bank to recover stolen money
[6] 7 places to check for signs of a targeted attack in your network
===================
[1] http://blog.soundidea.co.za/articles/Your_websites_been_hacked_now_what-378.html
[2] http://money.cnn.com/2014/08/15/technology/security/albertsons-supervalu-hack/index.html
[3] http://www.forbes.com/sites/kashmirhill/2014/08/13/so-many-pwns/
[4] http://www.theregister.co.uk/2014/08/16/time_to_ditch_http_state_network_injection_attacks_documented_in_the_wild/
[5] http://krebsonsecurity.com/2014/08/tenn-utility-sues-bank-over-327k-cyberheist/
[6] http://blog.trendmicro.com/trendlabs-security-intelligence/7-places-to-check-for-signs-of-a-targeted-attack-in-your-network/
Podcast: Play in new window | Download | Embed
Subscribe: RSS
SEC investigating breached companies; How companies can rebuild trust after a security breach; Preparing your company for a ransom attack; BAE retracts the story on hedge fund hack; Hackers compromising businesses via 3rd parties and remote access.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://www.sfgate.com/business/article/Hacked-companies-face-SEC-scrutiny-over-5596541.php
http://www.forbes.com/sites/katevinton/2014/07/01/how-companies-can-rebuild-trust-after-a-security-breach/
http://akamai.infoworld.com/d/security/prepare-yourself-high-stakes-cyber-ransom-245320
http://www.theregister.co.uk/2014/07/03/bae_retracts_hedge_fund_hack_allegation/
http://www.computerworld.com/s/article/9249516/Hackers_hit_more_businesses_through_remote_access_accounts
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Advice from Bob; SEC asks public companies to disclose more breaches; 230k IPMI devices found in Internet scan; PF Changs may have been hacked; Building network security to fail; 5 lessons from companies that get security right; Advice in responding to Anonymous threats; Bank of England announces assessment framework; Target shoppers don’t seem to be fazed by breach; Target board is under fire; Truecrypt may be coming back.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://www.reuters.com/article/2014/06/10/sec-cybersecurity-aguilar-idUSL2N0OR13U20140610
https://securityledger.com/2014/06/ipmi-insecurity-affects-200k-systems/
http://krebsonsecurity.com/2014/06/banks-credit-card-breach-at-p-f-changs/
http://www.forbes.com/sites/davelewis/2014/06/03/network-security-build-to-fail/
http://www.infoworld.com/d/security/5-lessons-companies-get-computer-security-right-243407
http://cyberwarzone.com/hackers-behind-oppetrol-will-attack-june-20-2014/
http://www.dailyfinance.com/2014/06/05/target-data-breach-shoppers-dont-care/
http://www.startribune.com/business/261527581.html
http://www.wired.com/2014/06/bleed/
http://www.forbes.com/sites/jameslyne/2014/06/02/truecrypt-is-back-but-should-it-be/
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Privileged user security; FTC holding companies to a mysterious security standard; Information overload; business users bypass IT and go straight to the cloud.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf
http://www.computing.co.uk/ctg/news/2345362/businesses-risk-data-breaches-due-to-confusion-over-privileged-user-information-security
http://www.networkworld.com/news/2014/053014-companies-should-already-know-how-282091.html
http://www.networkworld.com/research/2014/052914-information-overload-finding-signals-in-282019.html
http://www.networkworld.com/news/2014/052714-business-users-bypass-it-and-281911.html
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Advice from Bob on the importance of an accurate inventory; TrueCrypt meets an unfortunate end; Weak passwords are responsible for the initial intrusion in 31% of breaches; 71% of exploits used Java; 59% of malicious email used an attachment, 41% used a link; NTT’s Global Threat Intelligence Report finds that most incidents are the result of failing to take basic precautions; DHS reports about a public utility compromised by a brute force attack; There is an apparent discrepancy between the severity of the breaches detailed in the recent DOJ indictment of alleged Chinese hackers and the way that the breached companies categorize was was stolen, and whether that loss needed to be reported to share holders.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://arstechnica.com/security/2014/05/bombshell-truecrypt-advisory-backdoor-hack-hoax-none-of-the-above/
http://blog.itgovernance.co.uk/weak-passwords-responsible-for-31-of-cyber-attacks/
http://www.techcentral.co.za/surge-in-security-breaches-report/48374/
http://t.esecurityplanet.com/esecurityplanet/#!/entry/lowes-acknowledges-third-party-data-breach,5383580a025312186c0cf074
http://www.myce.com/news/only-51-of-anti-virus-scanners-detect-zero-day-malware-71652/
http://www.itproportal.com/2014/05/26/stop-the-blame-game-report-reveals-the-secrets-to-business-it-security/
http://news.techworld.com/security/3520791/public-utility-compromised-after-brute-force-attack-dhs-says/
http://mobile.bloomberg.com/news/2014-05-21/u-s-companies-hacked-by-chinese-didn-t-tell-investors.html