By Joel Rosenblatt
Columbia University Director of Computer and Network Security
One of the most useful things to me in trying to secure an enterprise like Columbia University is information, and the more information, the better. This means that for most of the time that I am not in meetings, I sit and read.
Most of my input overload comes in the form of emails, approximately 800 to 1,000 per day. I don’t claim to read all of them, and a good number are vendor solicitations.
By James Beeson
GE Capital Amercias CISO
Although information systems logs have been around since the early mainframe days, the concept of collecting and analyzing logs for security purposes is still a relatively new concept.
By Mark Rasch
One of the lessons of crisis management is that you don’t make predictions during a crisis. Not to say that the recent UK vote to leave the EU (“Brexit”) is a crisis per se, but just that it is a period of uncertainty. So what impact will Brexit have on data security, privacy, governance, and international cooperation in combatting cyber-crime?
Attackers targeted email accounts of staff working for or linked to the 2016 Hillary Clinton presidential campaign as well as the Democratic National Committee
Learn how hackers targeted email accounts of staff linked to the 2016 Hillary Clinton presidential campaign as well as the Democratic National Committee.
Four Key Steps to A Secure Cloud Migration
Cloud migration presents significant advantages, but before making the move, organizations must consider security and risk in these new environments.
Poisoned Windows Background Intelligent Transfer Service (BITS) tasks generated network alerts after malware remediation.
Read how threat actors leveraged a BITS capability to create self-contained, download-and-execute tasks that persisted after the original malware infection was remediated.
Welcome back to the underground where it’s a good time to be a bad guy
Customer service is the motto. Hackers are now extending their service hours, guaranteeing their work, and expanding their offerings to keep customers coming back.
Visit our experts June 7-9 to learn what’s happening in cybersecurity
–London Olympia, stand G10
Join us at InfoSecurity Europe as our experts host a number of sessions surrounding the security issues impacting organizations today.