• Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • Security Experts
  • Log In
Menu
  • Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • Security Experts
  • Log In

Day: August 14, 2013

** Wed 21AUG ** Que SARA, SARA: the Inevitability of Knowledge Sharing – an ICS-ISAC Public Briefing

ICS-ISAC logo

Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.

How BYOD can reduce operating costs

fluke networks

One aspect of BYOD that we don’t often talk about is its potential to reduce operating costs.

The cyber capabilities of Iran can hit US

Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country.

GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme

Following a pilot project aimed at providing UK government and business with an effective cyber incident response capability, GCHQ (in the form of CESG and CPNI) has launched two schemes

British Library’s wi-fi service blocks ‘violent’ Hamlet

A man using the British Library’s wi-fi network was denied access to an online version of Shakespeare’s Hamlet because the text contained “violent content”.

Trusteer white paper warns against escalating APT attacks

In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals

Zombie PCs are for crimelord chumps: Fear clusters, says infosec ace

It may be possible for a “single dedicated attacker” to run an internet “carpet-bombing” attack by applying Big Data and distributed computing technologies, security researcher Alejandro Caceres warns.

Encrypted email isn’t secure, but if you must use it, here are some Lavabit alternatives

Last week, FBI raids on Freedom Hosting and child porn distributors took down Tor Mail, a secure email provider for users of the Tor network.

China-based Intruders Use Fresh Attack Techniques Against Dissidents

The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.

How much confidential info is left unprotected in SharePoint?

A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures

← older

Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics

Twitter Facebook-f Linkedin Youtube

Working With Us

  • About Us
  • Advertise With Us
  • Information Security Companies Directory
  • List Your Company On Information Security Directory (LTD)
  • Search Information Security Companies
  • Contact Us

The Pages

  • Privacy Policy
  • Terms & Conditions
  • RSS Feeds

Our Contributing Experts

  • Information Security Expert Community (1000+)
  • Register as an Expert and Contribute
  • Submit Security Article

Copyright © 2022 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is in Harrison, ACT 2914.