Vulnerability exploit nets prisoners $225K
VLAN Network Segmentation ? What are The Hidden Costs?
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
Exobot Android Malware Targets Banking Apps
Source code for a new version of Exobot dubbed “Trump Edition” has been leaked online.
LifeLock Flaw Highlights Weak Web App Security
A web application design flaw results in a LifeLock data breach.
Imperva Acquires Prevoty, Enhances App Security
Prevoty’s LA office will become newest location for Imperva.
Two-Fifths of IT Leaders regard IoT Security as Afterthought
Trend Micro research uncovers worrying lack of investment in protection
XSS Flaws Most Common Over Past Nine Years
NCC Group says it’s still uncovering decades-old flaw in its research
Insurance Occurrence Assurance?
The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a reactive measure whereas an effective security program is a proactive measure.