California-based cybersecurity specialist FireEye has added six new members to its global leadership team, the firm recently announced
Performing Clean Active Directory Migrations and Consolidations
Active Directory Migration Challenges
Over the past decade, Active Directory (AD) has grown out of control. It may be due to organizational mergers or disparate Active Directory domains that sprouted up over time, but many AD administrators are now l…
Reduce Risk by Monitoring Active Directory
Active Directory (AD) plays a central role in securing networked resources. It typically serves as the front gate allowing access to the network environment only when presented with valid credentials. But Active Directory credentials also serve to gran…
Adobe patches four exploited ColdFusion flaws
In its own Microsoft-synchronized Patch Tuesday this month, Adobe merely issued an advisory on four known and exploited flaws in ColdFusion. Yesterday it patched them.
BC healthcare breach affects 5 million Canadians
Health data for more than five million British Columbians over the course of at least three incidents has been handled improperly by the Ministry of Health in its dealings with university researchers and contractors, violating the regulations for encry…
90% of passwords can be cracked in seconds
More than 90% of user-generated passwords can be made vulnerable to hacking in a matter of seconds, according to new research from Deloitte.
Sixty percent will fall to a phishing attack that might herald an APT
The type of attack known generally as an advanced persistent attack (APT) is typically highly targeted and advanced; that is, it is aimed at one company (or a small group of companies), and will likely use one or more zero-day exploits.
Sixty percent will fall to a phishing attack that might herald an APT
The type of attack known generally as an advanced persistent attack (APT) is typically highly targeted and advanced; that is, it is aimed at one company (or a small group of companies), and will likely use one or more zero-day exploits.
John McAfee turns up in Oregon to work on autobiography
Anti-virus security pioneer John McAfee has packed up and moved to Oregon, after months of erratic behavior and intrigue in Central America. His goal is to tell his life story through a series of media projects.
Red October cyber-espionage campaign targeted high-level government entities for 5 years
A high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations across the globe over the course of the last five years, security researchers say.