Cyber Security

The Best Digital Offense Starts With the Best Security Defense (Cisco)

We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More

Cyberattacks Again Roil Hollywood … Can Anything be Done About It? (L.A. Times)

Like most large corporations, major Hollywood studios are fond of outsourcing. From coming attraction trailers that are designed to draw audiences into cinemas to eye-popping 3D... More

Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)

The scope and severity of the fallout from the WannaCry attacks elicits plenty of "we told you so" head shakes about the dangers of ransomware. With a lightning-fast speed, the bla... More

Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)

If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More

XML vs. JSON: A Security Perspective (Independent Security Evaluators)

XML and JSON are both universal formats for arbitrary data sharing between computer architectures and programs, but there are a number of differences between them. These difference... More

Vulnerability and Patch Report, May 21, 2017 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 25.0.0.171. Updates are available from Adobe’s website. To see which version you have, go to Adobe’... More

Featured Jobs: Kroll; Aspera; DXC Technology

Cybersecurity Director — Los Angeles — Kroll Engineering Manager, Cloud Security — Emeryville, CA — Aspera Senior Information Security Engineer — Los Angeles ... More

How the WannaCry Attack Will Impact Cyber Security (Knowledge @ Wharton)

The worldwide cyber attack that began last Friday and goes by the name of “WannaCry” has highlighted the need for governments and businesses to strengthen their security infras... More

Cybersecurity Consciousness in the C-Suite (SC Media)

With cybercriminal risk at an all-time high across the globe, it's only inevitable that your company will be targeted, experts say. But, they add, the manner in which a company pre... More

8 Ways to Manage an Internet or Security Crisis (CSO)

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are ju... More

Russian Spies Conspired with Most Wanted Cybercriminal in Yahoo Hack — DOJ (Forbes)

Prosecutors today unsealed an indictment charging four men, including two Russian intelligence officials, with a 2014 hack of Yahoo that affected 500 million accounts. The U.S. cla... More

How to Catch Hackers? Old-School Sleuthing, With a Digital Twist (NYT)

Bank robbers wear masks and escape in vans with stolen license plates. Kidnappers compose ransom letters from newsprint to elude handwriting experts. Burglars target houses with th... More

Weekend Vulnerability and Patch Report, May 14, 2017 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 25.0.0.171. Updates are available from Adobe’s website. To see which version you have, go to Adobe’... More

Featured Jobs: MarkLogic; Kroll; NSS Labs

Applications Developer — San Carlos, CA — MarkLogic Cyber Security Consultant — Secaucus, N.J. — Kroll DevOps Engineer — Austin, TX — NSS Labs Click here to view all... More

Independent Security Evaluators: Holding Applications to a Higher Standard

Baltimore-based Independent Security Evaluators (ISE) has a unique perspective among security firms: the aggressive defense strategies needed to thwart attacks today must be center... More

CDSA Cybersecurity Pavilion 2017 Audio Now Online

Attendees of NAB Show 2017 were treated to three days of presentations by top cybersecurity and content protection experts from all corners of the media and entertainment sector, d... More

Pitfalls of Cybersecurity Shopping: Hype and Shoddy Products (CSO)

There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats. It isn’t a new strain ... More

Competing Claims of Security Vendors Sow Customer Distrust (Security Intelligence)

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and peop... More

Vulnerability and Patch Report, May 7, 2017 (Citadel Information Group)

Important Security Updates Avast: Avast! Free Antivirus has released version 17.4.2294. Updates are available on Avast’s website. Avast! has also released updates for Premier ... More

Featured Jobs: Avanade; NSS Labs; Dell EMC

Test Engineer, Advanced Endpoint — Austin, TX — NSS Labs IT Security Manager I — Lisle, IL — Dell EMC Cloud System Engineer — Chicago — Avanade Click here to ... More

TOP HEADLINES

  • Deluxe’s Beast, Company 3 Test Drive New Panavision DXL for ‘Underwater’ Short Film (Deluxe Blog)Director Russ Lamoureux’s ethereal short film more...

  • Amazon Sets Up Shop in the Heart of the Publishing Industry (NYT)Amazon is bringing its experimental, data-driven a more...

  • Spoiled by Agile (Wazee Digital Blog)Is it possible to practice agility and not have th more...

  • Cannes: Netflix Movies Dominate Early Digital Buzz Amid Screening Controversy (Variety)Netflix might not be returning to the Cannes Film more...

  • CFO: Disney Not Interested in Premium VOD (HMM)While studios and theater operators engage in talk more...

  • FCC Budget Showcases Rapidly Shrinking Media Regulatory Agency (THR)Don't expect much policing of indecency, competiti more...

  • The Best Digital Offense Starts With the Best Security Defense (Cisco)We have been talking about digitization for a whil more...

  • Cyberattacks Again Roil Hollywood … Can Anything be Done About It? (L.A. Times)Like most large corporations, major Hollywood stud more...

  • Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)The scope and severity of the fallout from the Wan more...

  • Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)If the cyberattacks that infected computers in mor more...

  • XML vs. JSON: A Security Perspective (Independent Security Evaluators)XML and JSON are both universal formats for arbitr more...

  • Stopping Ransomware Starts With Your Inbox, Cybersecurity Professionals Say (KQED)A screenshot of a virus-infected computer has been more...


OUR MEMBERS