9 Things You Need to Know Before You Store Data in the Cloud

Posted by:

Cloud Security SolutionsHave You Done Your Homework?

As the amount of data organizations are storing continues to mushroom, the costs of expanding your data center to keep up with the growth becomes cost prohibitive at some point.  That’s why cloud storage — which often comes at a fraction of the cost of storing the information on-premises — has become increasingly popular.

But before ...

Read More →
0

Kentucky Enacts a Data Breach Notification Law and Protects Student Data in the Cloud

Posted by:

Data Breach Protection Plan47 Down 3 To Go…….

While not nearly as significant as prescriptive the Massachusetts Privacy Protection regulation,  201 CMR 17.00, it is a step in the right direction for Kentucky as the Senate struggles to approve legislation that would cover the nation.

Kentucky Gov. Steve Beshear signed H.R. 232 on April 10, 2014, making the Commonwealth the 47th state to enact a ...

Read More →
0

SEC to Launch Cybersecurity Exams

Posted by:

Sec cybersecurity auditWill Assess More than 50 Broker-Dealers, Investment Advisers

If you’re an investment advisor or broker dealer, the time is rapidly approaching when you’ll be subjected to an SEC cybersecurity readiness audit.  Are you prepared?

The Securities and Exchange Commission is planning to conduct more than 50 examinations to assess cybersecurity preparedness in the securities industry and to obtain information about the industry’s recent experiences with certain types of cyberthreats.

Organizations to be examined ...

Read More →
0

Heartbleed: Researchers Claim That 95% Of Detection Tools Are Flawed

Posted by:

heartbleed bug tools flawed

You’re Not Out Of The Woods Yet….

If you’ve used one of the free Heartbleed checker tools on the Internet and your site came up “clean” for Heartbleed, you might think again before you breath a sigh of relief.  There’s a good chance you haven’t really checked everything and there’s an even better chance your sites not free from exposure.

Some tools designed to detect the Heartbleed vulnerability are flawed and ...

Read More →
0

New Red Herring Honeypot Fights Heartbleed

Posted by:

red herring honeypotWASHINGTON: US cybersecurity researchers have developed a technique that fights the ‘Heartbleed’ virus, and detects and entraps hackers who might be using it to steal sensitive data.

The Heartbleed bug, which became public last week, has set alarm bells ringing across the globe, including in India, for fear of exposing millions of passwords, credit card numbers and other sensitive information to hackers.

Researchers at The University of Texas at Dallas ...

Read More →
0

Akamai Heartbleed Patch – Not So Much!

Posted by:

Heartbleed Patch - Akami

Since Akami handles almost 1/3 of the Internet’s traffic so their patch that didn’t patch so much is a big deal.

Akami’s patch was supposed to have handled the problem. Turns out it protects only three of six critical encryption values.

Writing on his company’s blog Sunday night, Akamai chief security officer Andy Ellis said that while he had believed the Akamai Heartbleed patch fully fixed the issue, a security researcher ...

Read More →
0

Heartbleed: Gov. Agencies Respond

Posted by:

It’s Not Just A Website Issue

Security thought-leaders continue to offer insight into the Heartbleed bug. Avivah Litan, fraud analyst at Gartner Research, calls the issue “mega-serious.”

“I’m just trying to understand why all the news reports are focused on individual communications with websites,” Litan says. “SSL protocols, including OpenSSL, are used in most ‘trusted’ machine to machine communications. The bug affects routers, switches, operating systems and other applications that support the protocol in order to ...

Read More →
0

Heartbleed Bug – Open SSL Vulnerability Solution

Posted by:

heartbleed solutionThe TBG Security team has been investigating a critical vulnerability in the OpenSSL cryptographic library.  This vulnerability, which is known as the “Heartbleed Bug,” allows anyone on the Internet to read the memory of systems protected by vulnerable versions of the OpenSSL software.  This issue should be considered extremely critical due to its impact, long exposure, ease of exploitation, the absence of application ...

Read More →
0

Real Threats in Real Time: Kaspersky Lab Launches Worldwide Interactive Cyberthreat Map

Posted by:

real time cyber threat mapWhether you’re interested in actually tracking where the incidents are occuring in real-time or just simply looking for a way to visualize the threat level of your area, Kaspersky’s Interactive Cyberthreat Map shows you incidents worldwide.

The types of threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as ...

Read More →
0

Small Business Data Breach: Mitigating the Damage

Posted by:

If you’re a small business you’re probably following the Target fiasco closely and trying to figure out how this will impact your organization.

While data breaches at giant retailers like Target and TJ Maxx grab the spotlight, it’s just as realistic a scenario for small businesses – and the attacks at that level can prove far more devastating. Experts say small business owners who don’t make protecting customers’ personal information a top priority could ...

Read More →
0
Page 15 of 17 «...101314151617