Quantcast
Channel: Cybercrime – Core Security Blog
Browsing latest articles
Browse All 36 View Live

Passion and Relevance is Our Core

Nearly every IT security company sees its ultimate goal as making the electronic world a safer place to live and do business. At Core, we embrace this pursuit in a truly unique and powerful manner.

View Article



Intelligent Planning for Vulnerability Management

Vulnerability management can be a complex process to embrace. That's why organizations attempting to get further involved in the work should always have a comprehensive game plan.

View Article

Good News for Ethical Hacking

A new survey coming out of BT finds that more companies than ever have embraced penetration testing as the best way to manage risk and prevent future data breaches.

View Article

Mobile Risk Management in the Age of 4G

When Guglielmo Marconi first demonstrated wireless telegraphy in 1896, he probably did not foresee an era when the telephone would be wireless and subsequently utilized to facilitate global commerce....

View Article

Mirror Mirror on the Wall

Cyber crime has exploded in 2011. US-CERT noted a 40% increase in computer intrusions and the FBI’s number-one criminal priority is still cybercrime. The recently released SAIC / MacAfee study,...

View Article


Enough Already!

Could it be any clearer that information security approaches that focus on defensive tactics just aren’t working? How many times do we need to open the Wall Street Journal and see a headline about how...

View Article

With Friends Like This, Who Needs Enemies?

As the manager (and former lead engineer) of the “security intelligence” portions of our Insight product, I’m often tasked with thinking about security in different ways. A big part of that is finding...

View Article

What’s a CISO to do?

News out of Cupertino this week regarding a network breach and the resulting stolen source code representing four major security products is enough to make any CISO go prematurely gray. We understand...

View Article


Code Theft is Not Really Theft

The government ruling that “code theft” does not constitute as actual criminal theft might not seem at first to be a huge deal. But in reality – at least to software companies that produce their own...

View Article


Effective Security is about Solving problems, Not Chasing Hype

It had all the makings of sexy security story, a catchy name, international cyber criminals, the FBI, and the potential for thousands to be cut off from the Internet service they depend on.  Yet in the...

View Article

Is Cyber Security About to Become a Big Election Issue?

Those of us in the security industry have been wondering aloud for some time as to when the issue of cyber security would make its way into the election cycle. After the economy, national security is...

View Article

The Threats that Justify the Hype

Having been in the security industry for a long time now, I’m keenly aware of the fact that we are sometimes upstaged by expectations that don’t immediately materialize. Consider it an occupational...

View Article

The “Tipping Point”

Despite ample press coverage of massive, costly attacks despite all the warnings from experts many corporate leaders fail to fully appreciate the risk of IT security breaches and attacks.  Executives...

View Article


London Takes Gold in CyberSecurity

Maybe no news really is good news. I realize a lead that says ‘Nothing Happened’ isn’t going to excite a lot of people, but when the entire world is watching and almost expecting a significant...

View Article

What Shark Week Can Teach Us About Cybersecurity

Shark Week on Discovery Channel is undoubtedly one of the television highlights of the summer. Despite the fact that a large percentage of the population may have an extreme (and justified) fear when...

View Article


Counting on a U.S. Cybersecurity Bill? You May Want to Rethink Your Strategy

If you have been paying attention to the ongoing debate in Washington regarding the fate of the Cybersecurity Act of 2012, you undoubtedly know by now that the latest efforts to enact a form of cyber...

View Article

What a Cybersecurity Executive Order Should Look Like

There has been a lot of talk about whether President Obama should issue a cyber-security Executive Order since a Congressional filibuster last month killed the idea in bill form. And pressure is...

View Article


Washington confirms Chinese hack attack on White House computer

There is nothing more scary than the above headline, taken straight from foxnews.com. According to reports a phishing email was sent to a user on the White House computer network, the email was...

View Article
Browsing latest articles
Browse All 36 View Live




Latest Images