The Dark Side Of Covert Clouds

We know it happens all the time – employees want to get something done quickly, so they bypass the bureaucracy of their company’s IT department and with a couple of clicks go straight to the cloud. But by doing so, they greatly increase the risk of exposing the company’s network to malware. A recent survey of IT professionals...

Read more

Google Reports ‘Political’ Phishing Attacks In Iran

Phishing attacks in Iran have spiked dramatically in recent weeks and appear to be related to presidential elections in the country tomorrow (Friday June 14), Google said this week. Eric Grosse, vice president of security engineering, said in a blog post that over the last three weeks the company had detected and disrupted “multiple email-based...

Read more

PRISM Leaker Stirs US-China Cyber Feud

Edward Snowden, the source of the leaks about the US government’s PRISM cyber spying program,  claimed this week that the US has been hacking computers in China for at least four years. Snowden, who is now in hiding in Hong Kong – a Chinese-controlled territory – made the claims in an interview with the Hong Kong...

Read more

Moving from Compliance to Risk-Based Security, Part 1

After 10 years of managing an IT audit function for an international energy company, I had the opportunity to head up their IT Strategy group that was charged with creating Organizational IT Security and Risk profiles and plans. The charge of this function was to annually evaluate organization-wide internal and external risk as it relates to...

Read more

Global Security Technology Market Seen Booming

Gartner analysts this week forecast that the worldwide security technology and services market would grow 8.7 percent this year to $67.2 billion as cyber threats become increasingly sophisticated and dangerous. The analysts, attending a Gartner summit on security and risk management at National Harbour, MD, said the market could grow to more...

Read more

More Posts