Computer Security Pro
958 views | +0 today
Follow
Computer Security Pro
Computer Security for Business
Curated by P Dursey
Your new post is loading...
Your new post is loading...
Scooped by P Dursey
Scoop.it!

One big threat to cybersecurity: IT geeks can’t talk to management

One big threat to cybersecurity: IT geeks can’t talk to management | Computer Security Pro | Scoop.it
A new report on the state of risk-based cybersecurity management helps explain why IT employees and their corporate bosses don't see eye to eye about hacking and other computer-based threats.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Private sector counters cyber attacks with insurance | Germany | DW.DE | 14.07.2013

Private sector counters cyber attacks with insurance | Germany | DW.DE | 14.07.2013 | Computer Security Pro | Scoop.it
People have been talking about cyber security since Edward Snowden revealed how far-reaching NSA surveillance has become. A German insurer offering a "Cyber Protect" product is happy about the free advertizing.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Some security experts criticize Blue Cross’ handling of private data

Some security experts criticize Blue Cross’ handling of private data | Computer Security Pro | Scoop.it
Internal documents reveal an ongoing discussion within Blue Cross about whether to scramble or “mask” the data before sending it outside the company’s secure production area.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Dear Feds: You're Not Welcome At DEF CON

Dear Feds: You're Not Welcome At DEF CON | Computer Security Pro | Scoop.it
One of the world's largest computer security conventions used to welcome spooks. But this year it is telling intelligence agencies to stay away.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Mitigate Security Risk Before Your Business Collapses

Mitigate Security Risk Before Your Business Collapses | Computer Security Pro | Scoop.it
Mitigate Security Risk Before Your Business Collapses
Security is not an optional feature to be implemented after the horse has bolted.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Hacker Conference Asks Federal Agents to Keep Out

Hacker Conference Asks Federal Agents to Keep Out | Computer Security Pro | Scoop.it
DEF CON, formerly welcoming to NSA and CIA agents, asks them to stay away, at least for this year.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

PRISM Scandal Boosts Revenue of Swiss Datacenter Provider Artmotion

PRISM Scandal Boosts Revenue of Swiss Datacenter Provider Artmotion | Computer Security Pro | Scoop.it
The stringent laws which govern Swiss banks are derivative of the nation's privacy legislation, and now - thanks to the PRISM scandal - the country is fast becoming the ideal location for those turning their back on the cloud, says Mateo Meier,...
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Visa And Mastercard Ban Anonymizing VPNs... Just As They Allow Wikileaks | Techdirt

Visa And Mastercard Ban Anonymizing VPNs... Just As They Allow Wikileaks | Techdirt | Computer Security Pro | Scoop.it
This is random. Just as Mastercard and Visa are allowing payments to Wikileaks again after a two year hiatus, those same two companies have started banning VPN providers. If you don't recall, the credit card companies refused to process...
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Secure Salted Password Hashing - How to do it Properly

How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

How cryptography is a key weapon in the fight against empire states

How cryptography is a key weapon in the fight against empire states | Computer Security Pro | Scoop.it
Julian Assange: What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger ones
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

9 Biggest Data Encryption Myths Busted | Innovation Insights | Wired.com

9 Biggest Data Encryption Myths Busted | Innovation Insights | Wired.com | Computer Security Pro | Scoop.it
Image: CJ Schmit/Flickr Rarely a day goes by that you don?t hear about a data breach. Hospital records stolen. Social media accounts hacked. Education
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Hacker Holes in Server Management System Allow 'Almost-Physical' Access | Threat Level | Wired.com

Hacker Holes in Server Management System Allow 'Almost-Physical' Access | Threat Level | Wired.com | Computer Security Pro | Scoop.it
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

US government declares hacking an act of war, then hacks allies | WashingtonExaminer.com

US government declares hacking an act of war, then hacks allies | WashingtonExaminer.com | Computer Security Pro | Scoop.it
Revelations from European leaders on Monday that the National Security Agency bugged European Union offices in Washington and hacked into its computer network bring to light hypocrisy on the part of the U.S.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Cyber security in the private sector a 'significant' problem: government records - Business - Times Colonist

Cyber security in the private sector a 'significant' problem: government records - Business - Times Colonist | Computer Security Pro | Scoop.it
Cyber security in the private sector a 'significant' problem: government records
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Conflicts profit hackers selling software flaws worldwide - The Boston Globe

Conflicts profit hackers selling software flaws worldwide - The Boston Globe | Computer Security Pro | Scoop.it
NEW YORK — On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs — not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about...
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

NSA scandal delivers record numbers of internet users to DuckDuckGo

NSA scandal delivers record numbers of internet users to DuckDuckGo | Computer Security Pro | Scoop.it
Gabriel Weinberg, founder of search engine with zero tracking, credits Prism revelations with prompting huge rise in traffic
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

MIT Sloan professor receives highest honor from the president of Chile

MIT Sloan professor receives highest honor from the president of Chile | Computer Security Pro | Scoop.it
Related posts: Cutting staff is not a good operations strategy for retail Revenue management lessons learned from J.C. Penney MIT Sloan faculty earn esteemed awards
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

The Subtleties of Enterprise Security Vulnerability Management — at Scale

The Subtleties of Enterprise Security Vulnerability Management — at Scale | Computer Security Pro | Scoop.it
The Subtleties of Enterprise Security Vulnerability Management — at Scale
Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Why A Hacker Conference’s Fed Ban Is Bad News For U.S. Cybersecurity

Why A Hacker Conference’s Fed Ban Is Bad News For U.S. Cybersecurity | Computer Security Pro | Scoop.it
Hacker conference DEF CON announced on Wednesday that federal employees are not welcome at this year’s gathering, citing the recent revelations of National Security Agency (NSA) snooping: “For over two decades DEF CON has been an open nexus of hacker...
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA | Threat Level | Wired.com

Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA | Threat Level | Wired.com | Computer Security Pro | Scoop.it
It took more than eight years for a CIA analyst and a California computer scientist to crack three of the four coded messages on the CIA's famed Kryptos sculpture in the late '90s.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Privacy Auditing: An Exploratory Study by Penica Cortez, David Hay :: SSRN

Privacy Auditing: An Exploratory Study by Penica Cortez, David Hay :: SSRN | Computer Security Pro | Scoop.it
This paper reports an exploratory study of privacy breaches in the U.S. from 2005-2011 to explore potential benefits of data privacy auditing. Privacy auditing
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

Make Your Organization Anti-Fragile

For some orgs, dealing with big disruption is not so different from everyday problem-solving.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA | MIT Technology Review

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA | MIT Technology Review | Computer Security Pro | Scoop.it
Analysts believe that insurgents in Afghanistan form similar networks to street gangs in the US.
more...
No comment yet.
Scooped by P Dursey
Scoop.it!

New Argument in Forced-Decryption Case: Defendant's Memory Is Ticking Clock | Threat Level | Wired.com

New Argument in Forced-Decryption Case: Defendant's Memory Is Ticking Clock | Threat Level | Wired.com | Computer Security Pro | Scoop.it
Federal prosecutors are urging a federal judge to demand a Wisconsin man promptly decrypt several hard drives they believe contain child pornography.
more...
No comment yet.