Cyber Defense

2015 North American International Cyber Summit Offers Discount Pricing

DETROIT - The North American International Cyber Summit 2015, scheduled for Oct. 26 at Cobo Center, is offering new pricing as well as discounts for security groups. The cost is $79 to attend. There is also a discount price of $59 for students or members of the following organizations: ISSA, InfraGard, West Michigan Cyber Security

By |2015-10-07T20:09:32-04:00October 7th, 2015|Cyber Defense, Featured|

ISACA Detroit Chapter Meeting Oct. 21 Topics GRC, Audit Analytics

  TROY – The ISACA Detroit Chapter Meeting on Oct. 21 will feature two presentations: Pre-Dinner Topic: GRC Within a System Implementation Pre-Dinner Speakers: Chris McGee and Sarah Eilerman After-Dinner Topic: Audit Analytics After-Dinner Speakers: Libby Roop, CFE Peter Baciorowski, CISA. Registration and Networking begin at 4:30 pm at the Michigan State University Management Education

By |2015-10-05T19:14:37-04:00October 5th, 2015|Cyber Defense|

Are Your CEO And Board Ready For The Next Cyber Attacks?

DALLAS - Businesses suffered nearly 43 million known security incidents in 2014, an increase of 48 percent compared with 2013, and equals some 117,000 attacks daily. Yet, many boards and executives don’t have the information and resources they need to make effective business decisions on cybersecurity, contends a new report from AT&T. Drawing upon decades

By |2015-10-01T13:03:57-04:00October 1st, 2015|Cyber Defense|

Apple Exec: No More Malicious Apps At Our Stores

CUPERTINO, Ca. - A top Apple executive said Tuesday that measures have now been taken to prevent any more malicious apps to be found in the App Store, like the dozens reported last week. Phil Schiller, the company's senior vice president of worldwide marketing, said the source of the tainted apps was a program called

By |2015-09-24T19:45:20-04:00September 24th, 2015|Cyber Defense|

Apple Removes iPhone, iPad Apps Infected By Malware From Stores

CUPERTINO, Ca. - Apple has discovered and removed from its iPhone and iPad App Store dozens of apps that were infected by malware. The tainted software made it into the App Store via a counterfeit version of Apple's Xcode program, which is used to create apps for the iOS and Mac system software, CNET.Com reported.

By |2015-09-21T21:14:03-04:00September 21st, 2015|Cyber Defense, Featured|

New US-China Treaty Could Limit Cyberattacks

NEW YORK - Could cyberattacks one day be governed by treaties like those limiting the use of nuclear, chemical and biological weapons? The US and China are reportedly taking a first step in that direction. The countries are discussing a mutual promise not to launch a first-strike attack with cyberweapons on the other country's critical

By |2015-09-21T20:52:14-04:00September 21st, 2015|Cyber Defense, Featured|

Small Business Owners Take Action On Cyber Security

GLENVIEW, IL - A new survey says the majority of small business owners are concerned about breaches to their Internet and electronic security. As cyber security hacks have become an increasingly prevalent issue, 60 percent of small business owners said they are concerned enough that they are taking extra precautions including firewalls, offsite protected servers,

By |2015-09-18T20:25:01-04:00September 18th, 2015|Cyber Defense|

The Internet of Everything Is Here – How Do We Secure It?

LIVONIA - September 16 ISACA Detroit Chapter Meeting Pre-Dinner Topic will focus on the Internet of Things and Information Assurance, while the after-dinner topic will be Demonstrating Information Security Program Effectiveness. The Pre-Dinner presentation will be made by Keith Wilson, Systems Engineer, Lancope After-Dinner speaker is Doug Copley, Beaumont Health Systems. 4:30 - 5:00 Registration

By |2015-09-05T19:12:00-04:00September 5th, 2015|Cyber Defense, Featured|

Security Questions In Jeopardy After IRS Hack

WASHINGTON DC - Many people rely on security questions like "What's your mother's maiden name?" to protect their personal information online, but hackers are getting better at finding the answers. Case in point: the hackers who raided US Government's Internal Revenue Service data systems. Those attackers were much more successful at answering security questions than

By |2015-08-27T15:12:21-04:00August 23rd, 2015|Cyber Defense|