Research

The Best Digital Offense Starts With the Best Security Defense (Cisco)

We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More

Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)

The scope and severity of the fallout from the WannaCry attacks elicits plenty of "we told you so" head shakes about the dangers of ransomware. With a lightning-fast speed, the bla... More

Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)

If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More

FBI Offers Updated Business Email Compromise Warning, Stats (IC3)

Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payme... More

Competing Claims of Security Vendors Sow Customer Distrust (Security Intelligence)

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and peop... More

What We Learned from Verizon’s 2017 Data Breach Investigation Report (ITSP Magazine)

Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motiv... More

Cyber Espionage, Ransomware Attacks on the Rise (Verizon Enterprise Solutions)

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of t... More

ISSA-LA Information Security Summit Set for May 18-19 in L.A. (ISSA-LA)

More than 1,000 people are expected to attend the May 18-19 ISSA-LA Information Security Summit at the Universal City Hilton in Los Angeles, with IT and InfoSec executives, leaders... More

Best Defense Against Ransomware is Aggressive Offense (ITSP Magazine)

Ransomware is big money. In fact, according to the Federal Bureau of Investigation, ransomware attackers collected more than $209 million from victims in the first three months of ... More

NAB 2017: Watermarking, Securing Data and Protecting Broadcasts: A Preview of CDSA’s NAB Cybersecurity Program

The Content Delivery and Security Association (CDSA) kicks off its three-day “Cyber Security and Content Protection Pavilion” (C3830CS at the Las Vegas Convention Center) prog... More

Swimming in Security Data Without Drowning (IBM’s Security Intelligence)

How much information do you need to manage your security? Until recently, the answer was always “more.” That is changing as the sheer volume of available data grows. Today, co... More

NSS Labs Announces Web Application Firewall Group Test Results

NSS Labs has announced the results of its second Web Application Firewall (WAF) Group Test. A growing segment of the security market, WAFs employ a wide range of functions to work... More

10 Cybersecurity Myths That Must Be Busted (In Homeland Security)

Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats a... More

IT Leaders Share How They Quell Cybersecurity Attacks (CIO)

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that ... More

Why Continuous Vulnerability Assessment is Essential (Bank Info Security)

A continuous vulnerability assessment program should be baseline security requirement for all organizations, says Richard Bussiere, principal architect, APAC, at Tenable Network ... More

Pew Research: Cybersecurity Knowledge Quiz (Pew Research Center)

Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly se... More

Password Security Tips to Help You Foil Hackers (CBS News)

Details from this week’s federal indictment of Russian hackerscharged with compromising hundreds of millions of Yahoo accounts reveal that many people are still not taking rou... More

IBM, PwC Make Cybersecurity Ventures’ Top 50 Security Company List (IT Business Edge)

Cybersecurity spending is expected to reach $1 trillion over the next five years, according to the most recent Cybersecurity Ventures Cybersecurity Market Report. This has raised ... More

The Gender Gap in Cybersecurity Jobs Isn’t Getting Better (Slate)

Johanna Vazzana knew the job she’d applied for was a stretch. Vazzana, now a cybersecurity strategist working at Mitre, was interviewing early in her career for a technical c... More

Google Points to Another POS Vendor Breach (Krebs on Security)

For the second time in the past nine months, Google has inadvertently but nonetheless correctly helped to identify the source of a large credit card breach — by assigning a “Th... More

TOP HEADLINES

  • Deluxe’s Beast, Company 3 Test Drive New Panavision DXL for ‘Underwater’ Short Film (Deluxe Blog)Director Russ Lamoureux’s ethereal short film more...

  • Amazon Sets Up Shop in the Heart of the Publishing Industry (NYT)Amazon is bringing its experimental, data-driven a more...

  • Spoiled by Agile (Wazee Digital Blog)Is it possible to practice agility and not have th more...

  • Cannes: Netflix Movies Dominate Early Digital Buzz Amid Screening Controversy (Variety)Netflix might not be returning to the Cannes Film more...

  • CFO: Disney Not Interested in Premium VOD (HMM)While studios and theater operators engage in talk more...

  • FCC Budget Showcases Rapidly Shrinking Media Regulatory Agency (THR)Don't expect much policing of indecency, competiti more...

  • The Best Digital Offense Starts With the Best Security Defense (Cisco)We have been talking about digitization for a whil more...

  • Cyberattacks Again Roil Hollywood … Can Anything be Done About It? (L.A. Times)Like most large corporations, major Hollywood stud more...

  • Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)The scope and severity of the fallout from the Wan more...

  • Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)If the cyberattacks that infected computers in mor more...

  • XML vs. JSON: A Security Perspective (Independent Security Evaluators)XML and JSON are both universal formats for arbitr more...

  • Stopping Ransomware Starts With Your Inbox, Cybersecurity Professionals Say (KQED)A screenshot of a virus-infected computer has been more...


OUR MEMBERS