logoSign upLog in
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #RSA, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    fortune.com Beneath the RSA fun lurked the question of when this money merry-go-round will stop, and which cyber winners and losers will...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #ITCareers
    Jaime Contreras, MBA, CISM, CISA
    10 top ways IT pros are boosting their careers
    www.information-management.com What do IT pros hope to accomplish in their careers in 2017? To find out, job site Spiceworks polled more than 1,000 of members of the Spiceworks Community for their IT career...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #HCISPP
    Jaime Contreras, MBA, CISM, CISA
    Healthcare IT Certifications 2017: HCISPP, CAHIMS, CISSP, and CompTIA
    learnhealthtech.com Healthcare IT certifications 2017. HCISPP, CAHIMS, CISSP, and CompTIA Healthcare IT Technician certs to help you jump start your technology career in...
    Relevant
  4. Kevin Mitnick

    Kevin Mitnick

    22/02/2017
    What is low-cost SSL certificate? Who can offer it?
    Kevin Mitnick
    What is Low-cost SSL certificate? Who can offer it? (with image) · aboutssl
    storify.com Standard SSL Certificates also known as domain validated certificates are mainly aimed to secure small or medium level websites where less amount of information is being collected. Standard SSL Certificates comes up with less amount of prices and...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    RSA 2017: Voices of InfoSec Thought Leaders
    www.bankinfosecurity.com This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity Lessons From Kung Fu | SecurityWeek.Com
    www.securityweek.com Dodging an attack means that we prevent an attack from impacting our infrastructure. If the exploit coming at you cannot execute, it cannot cause damage or establish a...
    Relevant
  7. Greg Ness

    Greg Ness

    18/02/2017
    Greg Ness
    RSA: Time To Admit Security Is Broken
    www.talkmarkets.com Security infrastructure leaders may be about to experience a disruption similar to one already underway in the network infrastructure...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #IoT, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    How IoT hackers turned a university's network against itself | ZDNet
    www.zdnet.com A university found its own network turned against it - as refrigerators and lights overwhelmed it with searches for...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #Malware, #IoT
    Jaime Contreras, MBA, CISM, CISA
    University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices
    www.networkworld.com The university's hijacked vending machines and 5,000 other IoT devices were making seafood-related DNS requests every 15...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    DynA-Crypt Ransomware Steals and Deletes User Data
    www.infosecisland.com DynA-Crypt Ransomware Steals and Deletes User Data A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Security experts share 3 key insights on ransomware | Networks Asia
    www.networksasia.net Before people entangle themselves in everything digital that this year has to offer, it's important to heed expert...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Cybercriminals Use Hidden Malware to Access Financial Processes of Enterprises | CFO innovation
    www.cfoinnovation.com Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software to access to financial processes of...
    Relevant
  13. George Touryliov
    "Rogue One: A Star Wars Story" isn’t just a tale of scrappy rebels fighting against an evil Empire. With the issues it raises, including device authentication, asset management, and privilege control, it’s also a story about information security. Well, more like a cautionary tale.
    George Touryliov
    5 IT security lessons from Rogue One
    insights.hpe.com Rogue One isn't just a Star Wars story. It's an information security...
    Relevant
  14. Kevin Mitnick

    Kevin Mitnick

    14/02/2017
    Obtain the best Symantec Secure Site SSL Providers & Their Advantages
    Kevin Mitnick
    Obtain the best Symantec Secure Site SSL Providers & Their Advantages
    aboutssl.org The best Symantec Secure Site SSL certificate providers around the planet to support to protect customer sensitive data over the internet, intranet, extranets, and websites. A series of advantages of organization security from the world’s most...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #Phishing
    Jaime Contreras, MBA, CISM, CISA
    IRS: New Email Phishing Combines W-2 Theft, Wire Fraud
    www.bankinfosecurity.com Companies have lost thousands of dollars in email compromise attacks that first steal W-2s and then attempt wire transfer frauds, the IRS warns, labeling...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    FBI: Cybercrime Gang Stole $1.2 Million via Bank Malware
    www.bankinfosecurity.com The FBI says it's continuing to investigate an international cybercrime ring that stole at least $1.2 million via malware, money mules and overseas bank...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    1.9 million Michigan government workers PII compromised
    www.scmagazine.com Almost 1.89 million Michigan residents had their names and Social Security numbers potentially exposed due to when a software update went awry opening the information to...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #Privacy, #DataSec
    Jaime Contreras, MBA, CISM, CISA
    5 shocking new threats to your personal data
    www.computerworld.com The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Attention to cyber-security is becoming daily routine in the C-suite
    www.scmagazine.com While far-reaching and diverse, the underlying causes of security risks are amenable to collective...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Children’s Medical Center Pays Federal Fine Over Data Breach
    dfw.cbslocal.com Children's Health has paid an almost $3.2 million federal penalty after a multiyear investigation into patient data privacy...
    Relevant
  21. Kevin Mitnick

    Kevin Mitnick

    10/02/2017
    What are examples of Multi-Domain SSL Certificate?
    Kevin Mitnick
    What are examples of Multi-Domain SSL Certificate?
    aboutssl.tumblr.com Do you have multiple domain names and want to HTTPS for each of them? Then, a Multi-Domain SSL certificate is an ideal choice for all of them. After finding a right solution, the next thing...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    New malware stealing login data, bitcoin from cryptocurrency wallets
    www.hackread.com Cyren, an Internet security firm, has discovered a new malware that can steal bitcoin and passwords from cryptocurrency wallets on computers. The company...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Fake Chrome Font Update Attack Distributes Ransomware | SecurityWeek.Com
    www.securityweek.com A malware campaign targeting Chrome users with fake font update notifications is now distributing ransomware instead of ad fraud...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    PlayStation and Xbox forum hack exposes credentials of 2.5 million gamers | TheINQUIRER
    www.theinquirer.net Passwords and IP addresses compromised in ISO forum breach,Security ,Hacking,Security,cloud...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Federal agencies leasing in foreign owned buildings may cause cyberespionage risks
    www.scmagazine.com The report found at least 25 different offices used by the agencies including FBI, Department of Justice, State Department, and...
    Relevant
See all