A full 86% of the data breach cases investigated by Verizon Business in 2011 originated from hacking, and 92% were carried out by an external agent rather than an insider or partner, according to select findings from its 2012 Data Breach Investigations…
Bodog takedown: maybe SOPA and PIPA and ACTA and DEA just aren’t necessary
Civil liberties groups are happy that SOPA has, at least temporarily, gone away; and that ACTA seems to be running into problems in some European countries. But given recent LEA takedowns, are these new laws even necessary?
RSA 2012: Anonymous shakes up complacent corporate management
Anonymous has had at least one beneficial effect: top management at companies are starting to pay attention to information security, judged Grady Summers, vice president at MANDIANT, who participated in a Wednesday panel discussion on hacktivism at the…
RSA 2012: Are software liability laws needed?
Software liability laws are needed to hold software companies accountable for making faulty products, argued Bruce Schneier, chief technology security officer with BT during a pro-con debate held Wednesday at the RSA Conference.
RSA 2012: Schneier on why Anonymous is not a group and why they’re certainly not as good as you think they are
At the RSA Conference 2012 in San Francisco, February 29, Bruce Schneier and Davi Ottenheimer discuss Schneier’s latest book and how to enable the trust that society needs to thrive.
RSA 2012: BYOD often means ‘bring your own danger’
Three-quarters of IT professionals believe that personally owned mobile devices put their organizations at risk and only 39% have the necessary security controls to address the risk posed by the bring-your-own-device (BYOD) phenomenon, according to a W…
Risky business: IT professionals use risky methods for access control
A majority of information security professionals are employing risky methods to control access to enterprise servers, according to a survey by Fox Technologies and Echelon One.
XSS vulnerabilities discovered almost on demand
The last week has seen multiple XSS vulnerabilities found almost anywhere and everywhere on the internet, lending early weight to predictions for 2012.
Identity theft remains the major complaint reported to the FTC
For the 12th consecutive year the FTC has revealed that identity theft tops the list of consumer complaints received: 15% of 1.8 million complaints in 2011.
RSA 2012: Cyber security school challenge reaches 8000 children in 2011
At the RSA conference in San Francisco, February 28 2012, Joyce Brocaglia, founder of the Executive Women’s Foundation, hosted a session on the logistics and impact of the cyber security school challenge – a collaborative outreach program that helps ed…