Cyber Security Institute

Tuesday, February 28, 2012

RSA Conference Trending List

So what are the top buzzing noises are the RSA conference after a couple of hours onsite

MORE...

Monday, February 27, 2012

Log management deserves a company’s respect

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it?s the law.
Still, few companies take advantage of the benefits of log maintenance when it comes to detecting and responding to data breaches. In fact, according to Verizon?s 2011 Data Breach Investigations Report, less than one percent of the breaches analyzed were discovered through log analysis, while 69 percent of those breaches were detectable via log evidence.

MORE...

SOURCEFIRE FIRST TO PROVIDE NEXT-GENERATION IPS WITH INTEGRATED APPLICATION CONTROL

SourceFire announced the first Next-Generation Intrusion Prevention System (NGIPS) to provide fully integrated and intelligent application control. Sourcefire, which pioneered NGIPS in 2003, is extending its Agile Security™ vision by providing the world’s first NGIPS to incorporate real-time contextual awareness and full-stack visibility, together with intelligent security automation and granular application control.

MORE...

Monday, February 13, 2012

Number of Malicious Sites Increase by 240% in 2011

Blue Coat Systems issued its Blue Coat 2012 Web Security Report that identifies and analyzes trends in malicious attacks over the past year and makes recommendations on strategies to keep companies safe.  In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks.  These complex infrastructures, which outlast any one attack, drove a 240% increase in the number of malicious sites during the year and are expected to launch as many as two-thirds of all new attacks in 2012.

MORE...

Friday, February 10, 2012

M86 Security Labs report provides insight to plan security for 2012

M86 Security Labs just released its latest Security Labs Report detailing key trends and developments in Internet security.

MORE...

Thursday, February 09, 2012

Splunk Launches Splunk App for Enterprise Security 2.0

Splunk today announced the general availability of its Enterprise Security Intelligence Solution, consisting of the Splunk App for Enterprise Security 2.0, and Splunk® Enterprise™ 4.3, the company’s flagship software for collecting, indexing and harnessing machine data.

MORE...

Cybersecurity Is The Way To Play Defense Spending Read more: http://stocks.investopedia.com/stock-a

A recent survey by McAfee showed that 43% of respondents identified disruption to critical infrastructure as the greatest single threat posed by cyber-attacks, and nearly 57% believe that a cyber space arms race is occurring.

MORE...

Cybersecurity Is The Way To Play Defense Spending Read more: http://stocks.investopedia.com/stock-a

A recent survey by McAfee showed that 43% of respondents identified disruption to critical infrastructure as the greatest single threat posed by cyber-attacks, and nearly 57% believe that a cyber space arms race is occurring.

MORE...

Service providers lack confidence in LEAs

Arbor Networks’ 7th annual Worldwide Infrastructure Security Report presents a view of 2011 security through the eyes of the providers: ISPs, hosting companies, and service providers. “Ideology was the most common factor for DDoS in 2011,” it notes, “followed by a desire to vandalize.”  Since we have seen hacktivists willing to issue a general ‘call to arms’ and even provide the tools to take part in attacks, it represents, concludes Arbor, ‘a sea-change in the risk-assessment model’ for both network operators and their customers.

MORE...

Friday, February 03, 2012

Is Your Lawyer the Weakest Link? Hackers Are Now Targeting

A profoundly troubling article by Bloomberg details expanding efforts by hackers to attack system networks of law firms to cull confidential data on sensitive deals and transactions.
One attack in particular involved China-based hackers looking to derail a $40 billion acquisition of the world’s largest potash producer by an Australian mining conglomerate.

MORE...