security strategies

What infosec pros can learn from Tony Stark

Image by Yogysic, Getty Images. Infosec pros usually toil unappreciated in organizations, often fighting sometimes losing battles against well-armed opponents, and sometimes seemingly deaf employees. They ache to be superheros. Well, Aamir Lakhani, a global security strategist at Fortinet, believes fictional superheroes like Iron Man Tony Stark can teach them some lessons. At least that’s …

What infosec pros can learn from Tony Stark Read More »

Password lessons: Longer is better, so is salt

Infosec pros who had no idea of how easily a stolen list of hashed passwords could be cracked got a sobering lesson at this month’s SecTor security conference in Toronto. There, Will Hunt, co-founder of the U.K. based In.security consulting firm, casually talked of systems that can be built around a common (about $1,500) Nvidea …

Password lessons: Longer is better, so is salt Read More »

Trusted Computing Group meets in Toronto to discuss security standards

Representatives of some of the biggest names in computing have been quietly meeting in Toronto this week to discuss some of the smallest but vital intricacies of device security. The Trusted Computing Group, whose open standards are used to build security chips found in motherboards, routers, switches, smartphones and solid-state drives, is holding one of …

Trusted Computing Group meets in Toronto to discuss security standards Read More »

Don’t treat security awareness as a part-time job, says security expert

A security awareness program has to be an essential part of any organization’s cyber defence, above and beyond spending money on technology, according to experts in the field. But with organizations seeing no decrease in breaches of security controls, CISOs wonder where their program is going wrong. “They treat it like a part-time job,” answers …

Don’t treat security awareness as a part-time job, says security expert Read More »

Canada, U.S. among 26 nations urging rules-based control over cyberspace

Canada is among 26 countries that have issued a joint statement urging the world to agree to rules-based responsible behaviour in cyberspace, suggesting they will strike back against attackers if there isn’t agreement. “There must be consequences for bad behavior in cyberspace,” the statement says. “When necessary, we will work together on a voluntary basis …

Canada, U.S. among 26 nations urging rules-based control over cyberspace Read More »

Social media should co-operate on overseeing political advertising, expert tells Canadians

BRAMPTON, Ont. — Facebook and other social media platforms around the world need to use internationally-agreed upon standards for monitoring and taking down troublesome online political ads, according to a British expert. Sam Jeffers, a visiting global fellow at Ryerson University’s Leadership Lab and co-founder of the U.K. based service Who Targets Me, which monitors …

Social media should co-operate on overseeing political advertising, expert tells Canadians Read More »

Database with phone numbers of millions of Facebook users found on Internet

A server with databases holding the phone numbers and identity numbers of perhaps as many as 200 million Facebook users in the U.S., the U.K. and other countries has been found open on the Internet by a security researcher. No one knows who the database belongs to, how or when it was copied from Facebook, …

Database with phone numbers of millions of Facebook users found on Internet Read More »

Five steps to a better ransomware response plan

With a bit of luck the city of New Bedford, Mass., escaped having to pay a demanded US$5.3 million to criminals after suffering a ransomware attack last month. The mayor of the city revealed Wednesday how 158 of the municipality’s workstations — less than five per cent of the total — were locked out by …

Five steps to a better ransomware response plan Read More »

Thousands of Supermicro servers vulnerable to remote attack, says security vendor

IT administrators with Supermicro X11, X10 and X9 servers in their environments are being urged to take remediation action to protect the devices after the discovery of a vulnerability that could allow an attacker to remotely access servers through a USB key. The vulnerability in the baseboard management controller (BMC) was disclosed Tuesday by security …

Thousands of Supermicro servers vulnerable to remote attack, says security vendor Read More »

Study says fintech startups vulnerable to web or mobile app attacks

Financial technology startups like to boast that they are more nimble than their counterparts in the traditional banking world. But if a test of their websites and mobile apps by a cybersecurity vendor is accurate, the startups aren’t necessarily better at protecting their applications. The study released this week by ImmuniWeb is a follow-up to …

Study says fintech startups vulnerable to web or mobile app attacks Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com