InfoSec
204 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Greg Coticchia from Information Security & Society
Scoop.it!

Are you in HR? If so, you're a Hot target for Cybercriminals

Are you in HR? If so, you're a Hot target for Cybercriminals | InfoSec | Scoop.it

“ Hackers see HR as an easy – and valuable – target. Educating HR staff is a key defense.”


Via Jon Campbell, Nicole van Deursen
more...
No comment yet.
Rescooped by Greg Coticchia from Higher Education & Information Security
Scoop.it!

The CSO of the future

The CSO of the future | InfoSec | Scoop.it
What skills, background and education does a security executive need if they want their career to evolve?

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Greg Coticchia from Information Security & Society
Scoop.it!

Traditional approaches to cybersecurity 'no longer work' - Continuity Central (press release)

Traditional approaches to cybersecurity 'no longer work' - Continuity Central (press release) | InfoSec | Scoop.it
Traditional approaches to cybersecurity 'no longer work' Continuity Central (press release) While boards of directors are aware of the risks associated with cyber crime, partly because of recent high profile attacks in the news and partly because...

Via Nicole van Deursen
more...
No comment yet.
Rescooped by Greg Coticchia from Computer Ethics and Information Security
Scoop.it!

Andrew Rose: why security should be a 'Board Level' discussion

Andrew Rose, Principal Analyst Security and Risk, Forrester Research, Inc., shares his opinions on why security should be a 'Board Level' discussion; the imp...

Via Matthew *Matt Warren
more...
No comment yet.
Rescooped by Greg Coticchia from "#Social World, Internet, Gadgets, Computers, CellPhones, Future, Space"
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | InfoSec | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES, ABroaderView
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Greg Coticchia from Discover the Mobile Security World ::: "Mobile BYOD Cyber Security" Updates @1davidclarke
Scoop.it!

Your Top Exec Is Your Biggest Security Threat - Malcovery Security

Your Top Exec Is Your Biggest Security Threat - Malcovery Security | InfoSec | Scoop.it
Marissa Mayer doesn't lock her iPhone. Most execs don't. Here's why your company executives poses a threat to your enterprise security infrastructure.

Via @1DavidClarke
more...
No comment yet.
Rescooped by Greg Coticchia from Higher Education & Information Security
Scoop.it!

3 Strategies for the New Era of Enterprise Cybersecurity

3 Strategies for the New Era of Enterprise Cybersecurity | InfoSec | Scoop.it

The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

 

As this has occurred, we have witnessed the equivalent of a Cambrian Explosion of new Internet-connected life forms--mobile devices, tablets, sensors, actuators, home appliances, monitoring systems, content access devices, and wireless terminals. Applications running on these devices range from recreation to services critical to the functioning of our social and economic infrastructure. Put it all together, and we expect that world population of Internet-connected devices will grow from today's 10 billion to over 50 billion by the year 2020.

 

From a security point of view, these IT changes, including the expansion of Internet-connected devices, lead to a corresponding increase in attack surface. Instead of the mission of protecting a reasonably known and enclosed IT perimeter, we now must be ready to secure any connected device humans can make against any threat a hacker can innovate. Clearly, using established security practices, except on a larger scale, will not suffice.

 

Plainly said, we need to think differently about cybersecurity.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Greg Coticchia from Higher Education & Information Security
Scoop.it!

The 5 Biggest Cybersecurity Myths, Debunked | Opinion | WIRED

The 5 Biggest Cybersecurity Myths, Debunked | Opinion | WIRED | InfoSec | Scoop.it
While the Internet has given us the ability to run down the answer to almost any question, cybersecurity is a realm where past myth and future hype often weave together, obscuring what actually has happened and where we really are now. If we ever want to get anything effective done in securing the online world, we have to demystify it first.

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Greg Coticchia from Information Security & Society
Scoop.it!

To Tackle Cyber Crime, FBI Could Hire Hackers Who Smoke Weed

To Tackle Cyber Crime, FBI Could Hire Hackers Who Smoke Weed | InfoSec | Scoop.it
FBI can ignore its Anti-Drug Policy to Hire Hackers who smoke weed.

Via Nicole van Deursen
more...
No comment yet.
Rescooped by Greg Coticchia from Computer Ethics and Information Security
Scoop.it!

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal - Wall Street Journal (blog)

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal - Wall Street Journal (blog) | InfoSec | Scoop.it
IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal
Wall Street Journal (blog)
Protecting a company from data theft traditionally involves setting up a secure perimeter.

Via Matthew *Matt Warren
more...
No comment yet.
Rescooped by Greg Coticchia from Higher Education & Information Security
Scoop.it!

Four of the newest (and lowest) Social Engineering scams

Four of the newest (and lowest) Social Engineering scams | InfoSec | Scoop.it
Social engineering thugs have reached new lows, as gangs play on users’ fears of privacy loss, theft and even death.

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Greg Coticchia from CyberSecurity
Scoop.it!

Case Study: New Clues in the Target Breach

Case Study: New Clues in the Target Breach | InfoSec | Scoop.it
The folks at Malcovery have put together a compelling case that the avenue of compromise at Target stemmed from an SQL injection attack.was running on the retailer’s internal network.

Via Nigel Willson
more...
No comment yet.