Undercover filming shows employees breaking security policy
Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
For all scans so far, we’ve only used the default scan configurations such as host discovery, system discovery and Full & fast. But what if we don’t want to run all NVTs on a given target (list) and only test for a few specific vulnerabilities? In …
Email a Top Attack Vector, Users Can’t ID a Fake
While phishing emails grow more common, users can’t determine a fake from authentic message.
Energy, Utilities Attacks Inside IT Networks Rise
Attacks on enterprise IT networks that target information about critical infrastructure are on the rise, says Vectra.
Stolen Data Used in Ongoing Sextortion Scam
Attackers leverage breach data in Ongoing “Sextortion” Scam, says Barracuda Networks.
SamSam Attackers Have Hit 67 Ransomware Targets
Symantec claims 56 US firms have been hit this year
Eurostar Resets Passwords After Attack
Train operator takes precautions following attempts to access accounts
#SecuringEnterprise: Old Strategies Don’t Work
At MIT CSAIL’s Securing the Enterprise conference, BT Security president says risk is changing all the time.
#SecuringEnterprise: Talking Risk to Boards
Boards of directors need to think about cybersecurity as an existential crisis.