A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
The National Security Agency is creating new processes aimed at making it harder for systems administrators to misuse privileged access to agency systems, NSA officials told the U.S. House Intelligence Committee Tuesday. NSA director ...
Tags: NSA, 2-Person Rule
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
When it comes to education, most people agree, more is better. No one embodies that principle at least in regard to IT certifications better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber ...
Tags: software, Computer Products
The decline in usage share of Windows XP, which is slated for retirement in 53 weeks, has slowed significantly, hinting that millions of its users will hold onto the operating system much longer than some, including Microsoft, expect. ...
Tags: Windows XP, software, Computer Products
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened ...
Tags: SANS Institute, enterprise network, IT exec
President Obama could use tonight's State of the Union address to continue a push for new cybersecurity legislation, even as he's widely expected to issue an executive order Wednesday to impose rules aimed at protecting critical ...
The Pentagon is planning to expand its cybersecurity force nearly fivefold over the next several years in a bid to bolster its defensive and offensive computer capabilities. The plan is to add about 4,000 more military and civilian ...
The most controversial tech issue taken up by the outgoing Congress was, by far, the Stop Online Piracy Act (SOPA). This legislation drew a humongous public outcry that prompted a wholesale retreat by its supporters. But thanks to the ...
Tags: SOPA, legislation, controversial tech, outgoing Congress
CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
Organizers played "Eye of the Tiger" and "We are the Champions" over the loudspeakers as participants in the SANS Institute's NetWars Tournament of Champions sat down at their laptops and prepared for action. About 200 cybersecurity ...
Tags: SANS Institute, NetWars, Cybersecurity, Peers
The UK national Cyber Security Challenge has launched another competition aimed at addressing a critical Linux security skills gap. The majority of internet infrastructure is based on Linux, but Linux is rarely taught in schools and Linux ...
Tags: Cyber Security Challenge, critical Linux, internet infrastructure
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security
President Obama is exploring the option of using his executive authority to get government agencies and critical infrastructure owners to implement better controls for protecting their computer networks. According to a report by Reuters, ...
Tags: computer networks, White House, executive authority, critical networks
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity