10 Tips For Protecting Mobile Users

Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen. These days, every user is mobile. Laptops, smartphones, tablets, and constant connectivity have unshackled all of us from our desks. And thanks to the ready availability of apps and cloud services that blur the line between consumer and business tools, […]

Read More… from 10 Tips For Protecting Mobile Users

Higher retail wages correlate with lower levels of employee theft

A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations. Using data sets from the convenience-store industry, Clara Xiaoling Chen, a professor of accountancy, and […]

Read More… from Higher retail wages correlate with lower levels of employee theft

10 Ways Enterprises Can Battle Malware

As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations. The “Unlike most malware threats several years ago, which tended to be fast-spreading and easy to notice, many of today’s malware threats are more stealthy, specifically designed to quietly, slowly spread to […]

Read More… from 10 Ways Enterprises Can Battle Malware

Tech Insight: Speeding Up Incident Response With Continuous Monitoring

Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration Continuous monitoring is a buzz phrase come back to life thanks to the U.S. Office of Management and Budget and the Homeland Security Department telling government agencies to implement information security continuous monitoring (ISCM). NIST has also released three new […]

Read More… from Tech Insight: Speeding Up Incident Response With Continuous Monitoring

Homeland security cites sharp rise in cyber attacks

The companies that control critical infrastructure in the United States are reporting higher numbers of attacks on their systems over the past three years, according to a report issued by the Department of Homeland Security. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) says the number of reported attacks is up and attackers have […]

Read More… from Homeland security cites sharp rise in cyber attacks

Spy agency fights to protect ID’s of sources

Canada’s spy agency says its network of informants has been “imperiled” by a Federal Court of Appeal decision that struck down its right to always shield the names of its sources. Canada’s spy agency says its network of informants has been “imperilled” by a Federal Court of Appeal decision that struck down its right to […]

Read More… from Spy agency fights to protect ID’s of sources

Security lapses found at CDC bioterror lab in Atlanta

A federal bioterror laboratory already under investigation by Congress for safety issues has had repeated incidents of security doors left unlocked to an area where experiments occur with dangerous germs, according to internal agency e-mails obtained by USA TODAY. In one incident, an unauthorized employee was discovered inside a restricted area. A Centers for Disease […]

Read More… from Security lapses found at CDC bioterror lab in Atlanta

Risks of boomerangs a reality in world of cyberwar

WASHINGTON (AP) — The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran’s oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries. The government’s dual roles of alerting U.S. companies about these threats and producing powerful software […]

Read More… from Risks of boomerangs a reality in world of cyberwar

Flame Taps Bluetooth: Security Implications

Flame malware could use Bluetooth to exfiltrate data, record phone conversations, or learn the social network of a target. The Flame malware, detailed publicly for the first time Monday, has been described by security researchers working overtime to unravel its inner workings as “the largest and most complex piece of malicious code they’ve ever seen.” […]

Read More… from Flame Taps Bluetooth: Security Implications