Latest News and Alerts:
Be aware that there are a number of concerted attacks occurring now through a technique called “spear phishing”. This occurs when someone sends an e-mail that looks like a legitimate communication from someone who seems to be a real person, but it’s not. See the link here to get a good definition and some examples of spear phishing attacks. Never believe that you are not noticeable to someone who might want to target you. Always question any e-mail that you receive. If you don’t recognize the link to something or it has an attachment that you are not expecting, don’t trust it. You can even receive spear phishing e-mails from people you know who have had their e-mail accounts hacked through the same method. This happens daily at all A&M members. Here’s a good article that talks more about this technique to infect our infrastructure, take your information and generally cause havoc.
We must all be aware of the threats that face us. Each of us has a responsibility to not only protect ourselves, but others who share the same information resources such as the network we all share, the e-mail servers we share and so forth. A really good short article by Accenture explains our responsibilities here.
Daily news stories from around the world for the security executive.
Organized retail crime is continuing to grow, with 67 percent of retailers surveyed reporting an increase in the past year, according to the 13th annual ORC study by the National Retail Federation.
A new study reveals there is a lot retailers can do to boost future revenue by more effectively managing online purchase returns and fraud detection processes.
A new report reveals that businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels.
Women have made inroads into the top leadership positions in corporate America. Today, 26 women are serving as CEOs of Fortune 500 companies (5.2%), and 5.4% are serving as CEOs of Fortune 1000 companies.
A team of researchers at the University of Eastern Finland say voice biometrics are vulnerable to spoofing attacks.
The number of terrorism-related deaths fell for a second year in 2016, even though more countries in the West were affected as tactics shifted to lone-wolf attacks.
Legal issues may throw sand in the wheels of penetration testing machine. Luckily, all of them are solvable.
The Ipsos MORI Global Business Resilience Trends Watch 2018 survey reveals that the perception of risk remains elevated and while organizations are increasingly implementing prevention and mitigation measures there are still opportunities for improvement as major strategic aspects are being missed.
A new Google study reveals how accounts get hacked, taken over, or hijacked.
The demand for cybersecurity professionals remains strong across the United States, according to new data from CyberSeek™.
New York Attorney General Eric Schneiderman is proposing legislation to tighten data security laws and expand protections.
The Information Systems Security Association (ISSA) and independent industry analyst firm Enterprise Strategy Group (ESG) revealed trending data finding that the cybersecurity skills shortage is worsening and becoming a rapidly widening business problem.
Churches and Places of Worship welcome people in with open doors, but that could be the window of opportunity that leaves them vulnerable to someone with bad intentions.
In a newly released report, the Department of Homeland Security (DHS) Office of Inspector General (OIG) found that while DHS has established a process for sharing cyber threat information between the Federal government and the private sector, improvements are still needed.
The average business employee must keep track of 191 passwords, according to a report from LastPass.
An Iowa State University study has found when bar and nightclub owners increase security, they can help reduce crime for a neighborhood.
A new survey has found that four out of every five businesses across the US and UK will change how they deal with security in the coming 12 months.
Account Takeover has replaced Stolen Financials as the fastest growing fraud threat for eCommerce websites in 2017.
With the Internet of Things (IoT) as a foundation, technologies such as automated street lighting, smart energy meters, parking assistance apps and sensors have ability to make cities safer and more accessible, says a new report from the Consumer Technology Association (CTA).
Climate Central, a nonprofit news organization that analyzes and reports on climate science, has ranked the U.S. cities most vulnerable to major coastal floods.
Do you want to discover vulnerabilities before a hacker exploits them? Are you already aware of network vulnerabilities, but need an authority to testify that your network security needs additional investments?
Kevin L. Perkins has been named the new CSO for Exelon Corp.
NAVEX Global has released data that shows that US companies are now moving quickly to go after vendors on cyber issues.
The annual information-sharing event will take place in Arlington, VA, instead of at the State Department. The dates for the event, November 14-16, have not changed.
- Cybersecurity Enhancement Act of 2014
- TAC 202 Refresh
- Data Classification Update
- Identity and Access Management (IAM)
- Security Monitoring
- Risk Management Sandbox
- NIST Cybersecurity Framework news and education