I just read a white paper on a security vendor’s (Prevoty.com) web site and I think they really understand the problem. I have not had a chance to review their products, so I make no claims about them, but I do recommend reading the article. First a quote from the paper: Traditional security is like […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In an August 12, 2014 post on Pymnts.com, the information security executive at Urban Outfitters, Dawn-Marie Hutchinson, argued against disclosure of breaches. In fact, the company’s policy is to notify their lawyers first so that they can use attorney-client privilege. While I sort of understand the concept of not disclosing things too soon (like before […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to a presentation at the SysScan 360 security conference, Anti Virus software and other security products have security flaws just like every other piece of software on the planet. To some of us, that does not come as a big surprise. The researcher, Joxean Koret, tested a number of security products and found issues with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It has been reported in the NY Times, among other places, that a Russian crime gang has amassed 1.2 BILLION userid/password combinations, along with 500 million email addresses. Even to me, that is a large number. The passwords represent data stolen from 420,000 web sites, including both large and small companies. The bad news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an item on Govtech, The FBI is looking for a little help from businesses in their effort to bring cyber criminals to justice. Assistant AG for National Security John Carlin and FBI Director James Comey said they need more than knowing how a breach occurred. They also want to know why the bad […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Those of you who have been following the Target Company’s security breach are probably aware that the publicly stated source of the breach was a heating vendor who clicked on a malicious email and set the wheels in motion for one of the largest security breaches ever. Since since the old adage says that your firm’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]