The Latest and Strangest Security Risk

Last week, we discussed endpoint protection for mobile devices, and how cybersecurity threats tend to crop up in the most unexpected places. Now, based on an August report, we know that you may be overlooking another mundane but crucial vulnerability in your organization: the office printer. A Saturday panel at DEF CON, the hacking convention […]

Ransomware as a Service

If you’re familiar with cyber attacks, you’re probably familiar with ransomware, a form of malware designed to deny access to a computer system and encrypt sensitive data until a “ransom” is paid. Ransomware has its origins in the early stages of the cyber world, and over time, its effects have only gotten more vicious. But […]

A Statewide Cybersecurity Emergency

School systems in Louisiana are under siege—and the culprit is in the coding. In the last three weeks, three North Louisiana school districts have found themselves impacted by a malware virus that shut down computer systems and breached district servers. In response, Louisiana Governor John Bel Edwards has issued a state of emergency, and the […]

Insights From Verizon’s Data Breach Investigations Report

In early spring, while many people are anticipating the return of warm weather and blue skies, the information security industry is looking forward to the release of Verizon’s annual Data Breach Investigations Report (DBIR). Published since 2008, DBIR is a data security reference guide, playbook and bible. Global in scope, the report analyzes thousands of […]

Key Takeaways from RSA 2015

RSA 2015 drew more than 28,000 security-minded people to its latest week-long conference in San Francisco. The key takeaways from the discussions, workshops, and keynotes were highlighted by the tech, business, and mainstream press. The Associated Press coverage pointed out that attending RSA is a particularly sobering experience for those not involved in the security […]

Retail Digital Security Best Practices

The National Retail Federation recently presented Congress with a set of solutions aimed at better protecting consumers and helping businesses prevent data breaches. “We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said in a statement. “Instead, it is […]

New Retail PoS Malware Discovered

A new malware family targeting point-of-sale (PoS) systems, is infecting machines in order to scrape [payment card iinformation from memory. The malware, dubbed PoSeidon, was initially spotted by researchers from Cisco’s Security Solutions (CSS) team. PoSeidon, like most point-of-sale Trojans, scans the RAM of infected terminals for unencrypted strings that match credit card information. End-to-end […]

Has Sloppy Security Slipped Into Your Network Ecosystem?

Much has been said about Sony, and much remains to be said. But the bottom line is that Sony was a cyber attack that was simply waiting to happen. This is a company that has been repeatedly hit by malicious hackers who, angered by Sony’s approach to Digital Rights Management, were determined to wreck havoc […]

Does Your Organization Need Cyber Insurance?

News about the damage associated with the Sony breach keep coming, and is most likely going to reach new heights over the Christmas break. Meanwhile, criminals keep conducting immensely successful hack attacks against huge brands that should have the financial assets and talent to protect against breaches. Has this risk management gone very wrong — […]

The New Federal Strategic Health IT Plan

The Office of the National Coordinator for Health IT, a unit of the Department of Health and Human Services, has issued its Strategic Health IT Plan for 2015 to 2020. The plan, developed in collaboration with more than 35 federal agencies, has five main goals: Furthering the adoption of health IT Improving the security and […]