Travel Smart: Four Tips for Taking Cyber Security on the Road

Cyber Security on the Road

July 4th marks the peak of summer here in the United States, and with it brings an uptick in travel. Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber security best practices are coming […]

Security Expert Comment on PCI DSS V3.0 Retired

PCI DSS v3.0 will be retired. Many companies are still unaware that they have a sunset date of 30 June 2016 for PCI DSS 3.1 compliance, any new projects must not use  SSL and early TLS as security controls to protect payment data. Please find comment below from Kevin Bocek, Vice President Security, Strategy and Intelligence at Venafi. Kevin Bocek, Vice President Security, […]

Comments on Two SSH Vulnerabilities on Cisco Virtual Appliances

2 SSH vulnerabilities have been discovered on Cisco Virtual Appliances because the virtual machines running on VMWare and KVM virtualization platforms share a default authorized SSH key. There are already patches for these vulnerabilities. The SSH keys were initially created for customer support access. If a user were to maliciously employ these keys, they would […]

World Economic Forum’s Partnering for Cyber Resilience

World Economic Forum’s Partnering for Cyber Resilience

Introduction Partnering for Cyber Resilience was compiled by the World Economic Forum’s Partnering for Cyber Resilience ( the complete paper can be found here). This organization and its current initiative aim to establish awareness of cyber risk and to build commitment regarding the need for more rigorous approaches to cyber risk mitigation. The initiative started […]

IT Security Conference & Exhibition

IT Security Conference & Exhibition

ENITSE Enterprise IT Security Conference & Exhibition will be held on 04-05 November 2015 in Istanbul – Turkey. ENITSE is a conference focusing on IT security solutions developed for large institutions in the private sector. ENITSE Conference serves a perfect platform to introduce and demonstrate solutions including platform, system, hardware, software, consultancy, training and service. […]

Incident Response – How Late is too Late?

Incident Response - How late is too late

Cyber threat awareness is not limited to an obscure crowd of coding geeks—and hasn’t been for a long time. In fact, just earlier this year, U.S. intelligence director James Clapper announced that cyber attacks top the list of threats facing the U.S.[1] The sheer number of breaches reported is testimony to the fact that IT […]