Advice from a CISO: Blockchain still searching for its tipping point

Credit to Author: IDG Connect| Date: Tue, 27 Mar 2018 07:23:00 -0700
To read this article in full, please click here
(Insider Story)
Read MoreRSS Reader for Computer Security Articles

Credit to Author: IDG Connect| Date: Tue, 27 Mar 2018 07:23:00 -0700
To read this article in full, please click here
(Insider Story)
Read MoreCredit to Author: Sharky| Date: Mon, 26 Mar 2018 03:00:00 -0700
Manager at this software vendor insists on having admin rights to every system, and she likes to set passwords that consist of the name of the company’s flagship product, reports a pilot fish working there.
“She would use ourproductname1 — or ourproductname1! if that didn’t satisfy complexity requirements — for production systems,” fish says. “Sending her a copy of our organization’s security requirements didn’t seem to help.
“Thankfully, as our product matured, more and more of the older systems came offline and were replaced by me with newer systems and secure passwords.
“One fine morning I received a barrage of alerts that our SaaS product was down. Looking through the logs, I saw a multitude of authentication errors from attempted database connections.

Credit to Author: Lily Hay Newman| Date: Sun, 25 Mar 2018 11:00:00 +0000
No matter how much mystique a hacker persona has, the individual or group behind it inevitably makes operations security errors sometimes.
Read More
Credit to Author: Brian Barrett| Date: Sat, 24 Mar 2018 13:00:00 +0000
Reddit bans, Atlanta ransomware, and more of the week’s top security news.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 23 Mar 2018 19:49:06 +0000
With $380 million in the spending bill earmarked for securing digital elections, the time for talk is over.
Read MoreCredit to Author: Jay Abdallah| Date: Fri, 23 Mar 2018 14:30:26 +0000
Every process requires detail, precision and collaboration. If all of the components of the process aren’t working together, it fails. And that can result in catastrophe. As an example, let’s… Read more »
The post Strengthen cybersecurity through a united industry appeared first on Schneider Electric Blog.
Read More
Credit to Author: Issie Lapowsky| Date: Fri, 23 Mar 2018 17:51:27 +0000
On Friday, after months of silence, Tumblr named 84 accounts it says were devoted to spreading propaganda and disinformation on the platform.
Read More
Credit to Author: Garrett M. Graff| Date: Fri, 23 Mar 2018 15:49:17 +0000
A new indictment asserts a long string of attacks against hundreds of universities and private companies, in which Iran pilfered more than $3 billion worth of intellectual property.
Read More