The End of the Industrial-Scale Network

June 25, 2015 |
Why Network Access Control Risk is Failing Security Professionals

One of the concepts gaining credibility in network security today is the idea of the software-defined perimeter. Organizations are beginning to realize that because their users are such a heterogeneous group, it’s no longer viable for them to provision network... Read More

Defending Against an OPM-Style Cyber Attack

June 23, 2015 |
Decorative image

Author Chris Stoneff recently posted a great article on INFOSEC Institute: The Seven Steps of a Successful Cyber Attack. Stoneff makes some great points that I wanted to share as well as provide some additional insights and recommendations. Stoneff states,... Read More

Are You Keeping Your Encryption Keys Secure?

June 9, 2015 |
Decorative Image of padlock

Uber, the San Francisco company behind the popular ridesharing app, is one of Silicon Valley’s highest-valued startups. But it’s also no stranger to controversy, having faced regulatory opposition in many of the major urban centers it operates, as well as... Read More

What Can We Learn From the Carbanak APT?

June 2, 2015 |
Photo of person inserting a bank card into an ATM

Earlier this year, Kaspersky Lab reported the discovery of a new advanced persistent threat (APT) it dubs ‘Carbanak’. Assuming the firm’s intelligence is correct, this sustained cybercrime campaign may have cost banks, payment providers and other financial institutions as much... Read More