Eyes on Security
Follow
Find
435 views | +0 today
Your new post is loading...
Your new post is loading...
Scooped by Ahmed Al Enizi
Scoop.it!

US Cyber Command's Plan X: Pentagon Launching Covert Cyber Attacks - Center for Research on Globalization

US Cyber Command's Plan X: Pentagon Launching Covert Cyber Attacks - Center for Research on Globalization | Eyes on Security | Scoop.it
US Cyber Command's Plan X: Pentagon Launching Covert Cyber Attacks Center for Research on Globalization Under terms of the five year contract, Lockheed Martin and niche malware developers have completed work on a test-bed housed in a “specially...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

SANS Institute: Reading Room - Auditing & Assessment

SANS Institute: Reading Room - Auditing & Assessment | Eyes on Security | Scoop.it
Auditing Windows Environments PowerShell XML output, windows security, ossams Cody Dumont - February 7, 2012. A security ... Scoping Security Assessments - A Project Management Approach Ahmed Abdel-Aziz - June 7, 2011.
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Survey Shows Majority of Tech Executives Planning for Cyber Security Attacks - Hospitality Technology

Survey Shows Majority of Tech Executives Planning for Cyber Security Attacks - Hospitality Technology | Eyes on Security | Scoop.it
Survey Shows Majority of Tech Executives Planning for Cyber Security Attacks Hospitality Technology Silicon Valley Bank, financial partner to the innovation sector, found the majority of technology and healthcare companies view cyber security as a...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

72 hours of Security News

72 hours of Security News | Eyes on Security | Scoop.it
Security News and more (ID Security CEO: NYT Hackers Did Their Homework | CIO Today, http://t.co/90GpsOzl8C #security)
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

The Impact of Mobile Devices on Information Security | ZoneAlarm ...

The Impact of Mobile Devices on Information Security | ZoneAlarm ... | Eyes on Security | Scoop.it
Mobile platforms with greatest security risk. Mobile devices are a cause of concern for organizations. Sensitive corporate information can be transported and lost via iPhones and Androids, and the BYOD movement has ...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Protection Test - Numbers

Protection Test http://bit.ly/1cHy9Iz How safe are you online? Are you really protected from online threats? What about your phone or tablet? More devices ar...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

7 Tips to Follow When Evaluating Security Tools [VIDEO] | Rapid7

7 Tips to Follow When Evaluating Security Tools [VIDEO] | Rapid7 | Eyes on Security | Scoop.it
In the process of evaluating security tools for your organization? Watch this quick video to learn about the 7 things you should be looking for. Watch now!
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

8 Simple Online Privacy Tips Everyone Needs To Know

8 Simple Online Privacy Tips Everyone Needs To Know | Eyes on Security | Scoop.it
8 simple online privacy tips everyone needs to know. (Good privacy info. Useful in this information era!
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

8 Tips to Stay Private Online - Fox Business

8 Tips to Stay Private Online - Fox Business | Eyes on Security | Scoop.it
8 Tips to Stay Private Online
Fox Business
By Michael Gregg, COO of Superior Solution. Published July 05, 2013 ...
more...
No comment yet.
Rescooped by Ahmed Al Enizi from SME Cyber Security
Scoop.it!

Android Hack-Tool discovered by F-Secure

Android Hack-Tool discovered by F-Secure | Eyes on Security | Scoop.it

Android Hack-Tool discovered by F-Secure confirming cyber threats targeting Android devices are rapidly growing in quantity and sophistication level (Android Hack-Tool discovered by F-Secure http://t.co/77Pa5KZKao)...


Via Roger Smith
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Shining a light on data breaches - CRN Australia

Shining a light on data breaches - CRN Australia | Eyes on Security | Scoop.it
Shining a light on data breaches CRN Australia If the most important objective is to protect information – not only its privacy, but also its availability – risk management needs to be managed at the appropriate level, so that both business and...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

'Master key' to Android phones found

'Master key' to Android phones found | Eyes on Security | Scoop.it
A 'master key' that could give cyber-thieves open access to almost any Android phone has been discovered by security researchers. (@glapworth ♻ Huge Android software bug.
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Information security breaches survey 2013 - PwC in the North

We were commissioned by the department for Business, Innovation and Skills (BIS) to survey companies across the UK on recent cyber security incidents and emerging trends. This survey aims to...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Feds Take Down Online Fraud Bazaar 'Silk Road', Arrest Alleged Mastermind - Krebs on Security

Feds Take Down Online Fraud Bazaar 'Silk Road', Arrest Alleged Mastermind - Krebs on Security | Eyes on Security | Scoop.it
U.S. News & World Report Feds Take Down Online Fraud Bazaar 'Silk Road', Arrest Alleged Mastermind Krebs on Security Prosecutors in New York today said that federal agencies have taken over the Silk Road, a sprawling underground Web site that has...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

'Watering holes' join Java as a major threat to corporate security, says F-Secure - ZDNet (blog)

'Watering holes' join Java as a major threat to corporate security, says F-Secure - ZDNet (blog) | Eyes on Security | Scoop.it
ZDNet (blog) 'Watering holes' join Java as a major threat to corporate security, says F-Secure ZDNet (blog) Helsinki-based F-Secure has just released its Threat Report for the first half of 2013, and much remains the same: Java in the browser is...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Social Media Security Best Practices ~ A Video from the AMA

Social Media Security Best Practices ~ A Video from the AMA | Eyes on Security | Scoop.it
The American Marketing Association’s AMA TV network explains some social media security best practices in this video based on a HootSuite guide. (Have you done an audit of your company’s social media accounts?
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Why can't email be secure?

Why can't email be secure? | Eyes on Security | Scoop.it
Coming on the heels of our announcement that we had shut down our Silent Mail service, we received a comment about securing email communications. In a recent press release, your company stated it w...
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

How Important Is Information Security For Businesses [Infographic] - Business 2 Community

How Important Is Information Security For Businesses [Infographic] - Business 2 Community | Eyes on Security | Scoop.it
How Important Is Information Security For Businesses [Infographic]
Business 2 Community
No business is too small for information security.
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Free Security Assessment Tool - RiskRater | Rapid7

Free Security Assessment Tool - RiskRater | Rapid7 | Eyes on Security | Scoop.it
Assess you mobile, endpoint, and user-based risk against industry benchmarks for free with the new Rapid7 RiskRater tool.
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

3rd Cybersecurity Framework Workshop

On July 10-12, the University of California, San Diego (UCSD) and the National Health Information Sharing and Analysis Center (NH-ISAC) will host the third C...
more...
No comment yet.
Rescooped by Ahmed Al Enizi from Technology in Business Today
Scoop.it!

Cyber Safety: An Interactive Guide To Staying Safe On The Internet

Cyber Safety: An Interactive Guide To Staying Safe On The Internet | Eyes on Security | Scoop.it
The Internet is without a doubt one of the best resources available to us. Unfortunately it’s also extremely dangerous if you aren’t aware of who and what lurks behind the scenes.

Via TechinBiz
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

6 Steps to Secure Mobile Devices

6 Steps to Secure Mobile Devices | Eyes on Security | Scoop.it
NIST unveils SP 800-124: Guidelines for Managing the Security of Mobile Devices in the Enterprise.
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Information security risk universe

Information security risk universe (effective #risk #management depends on how well you understand your #risk #universe http://t.co/A6amNteWN0)
more...
No comment yet.
Scooped by Ahmed Al Enizi
Scoop.it!

Physical security information management (PSIM)

Physical security information management (PSIM) | Eyes on Security | Scoop.it
Physical security information management software synthesizes data from video, access control systems, and other physical sensors (Wat is PSIM eigenlijk?
more...
No comment yet.