Cyber Defense

Boom Times for Cloud Security

BIRMINGHAM - Amazon announced several initiatives at its AWS re:Invent conference that are destined to disrupt several markets. One such program is Amazon WorkSpaces, an Amazon provided virtual desktop (VDI) product, which will be available for a low monthly fee, starting, according to Amazon, at $35. Another initiative is AWS AppStream that provides infrastructure to

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

IT Security Salaries Expected to Increase in 2014

By Aimee Rhodes TENAFLY, N.J. - IT-security related salaries are expected to climb in 2014, according to a survey released by TEKsystems, which polled some 900 IT leaders including CIOs, IT VPs, IT directors and IT hiring managers. Some 65 percent of respondents said they expected security salaries to increase. That?s up from a similar

By |2013-11-15T00:00:00-05:00November 15th, 2013|Archive, Cyber Defense|

Software Defined Radio: A Hacker’s Dream

TENAFLY, N.J. - Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn?t light- or sound-based will attract a hoard of researchers (and attackers) looking at ways to exploit them. Are you prepared? It is now known that your car?s GPS, toaster and medical devices are vulnerable to attack. For

By |2013-11-13T00:00:00-05:00November 13th, 2013|Archive, Cyber Defense|

Internet Bug Bounty Offers $5000 Reward For Hacks

SAN FRANCISCO - Internet Bug Bounty challenges you to hack your way into such critical Web platforms as OpenSSL, PHP, Perl, and Apache for the chance to earn as much as $5,000. Sponsored by Microsoft and Facebook, one challenge even invites you to hack the Internet itself, meaning finding a bug that affects a wide

By |2013-11-11T00:00:00-05:00November 11th, 2013|Archive, Cyber Defense|

Snowden Reportedly Used Co-Workers Passwords To Gain Access To Secrets

WASHINTON DC - Former NSA contractor Edward Snowden reportedly gained access to classified data after persuading several co-workers to reveal their passwords. As many as 20 to 25 workers at a National Security Agency base in Hawaii revealed their login credentials to Snowden, allowing him to obtain some of the documents that he eventually leaked

By |2013-11-11T00:00:00-05:00November 11th, 2013|Archive, Cyber Defense|

HyTrust Acquires Competitor HighCloud Security

TENAFLY, N.J. - Cloud security provider HyTrust Inc. said on Thursday it had acquired HighCloud Security for an undisclosed sum, striking a deal it said would round out its security offering. The move follows HyTrust?s $18.5M Series C financing round in August and comes as enterprises increasingly deploy private cloud services. HyTrust said that it

By |2013-11-08T00:00:00-05:00November 8th, 2013|Archive, Cyber Defense|

New Certification Launched For Healthcare Information Security And Privacy Professionals

TENAFLY, N.J. - Insurance fraud. Identity theft. Financial fraud. These are just a few of the risks associated with storing personal healthcare information online. Healthcare organizations hold some of the most private and sensitive information, and if it were to be comprised, a breach of this data could have serious repercussions for individuals and organizations

By |2013-11-08T00:00:00-05:00November 8th, 2013|Archive, Cyber Defense|

A Week of Rage Against the NSA

BIRMINGHAM - If you are like me you completely discount official protests as posturing. In this age of suspicion of all politicians there is not much to be read into the President of Brazil, angry about spying, canceling a state visit to the United States, or the governments of Germany, Spain and France summoning their

By |2013-11-08T00:00:00-05:00November 8th, 2013|Archive, Cyber Defense|

Motorcity ISSA November Meeting – Selling Risk Management Internally

LIVONIA ? Selling Risk Management Internally and gaining support For your program are the topics on Nov. 21 at the ISSA Motorcity Chapter meeting at Schoolcraft College. Stephen Marchewitz, President of SecureState, will talk about the Risk Based Approach to Security Management. To pull it off, you need support from senior management to make the

By |2013-11-07T00:00:00-05:00November 7th, 2013|Archive, Cyber Defense|