May 7, 2012
How Cyber Secure are Public Companies?
Infographic via Veracode
You should also check out Threatpost’s ongoing 5-part series with Veracode’s Fergal Glynn.
A CISO’s Guide To Application Security - Part 1: Defining AppSec
A CISO’s Guide To Application Security - Part 2: The Growing Threat to Applications
A CISO’s Guide To Application Security - Part 3: Toward an AppSec Center of Excellence
A CISO’s Guide To Application Security - Part 4: Weighing AppSec Technology Options

How Cyber Secure are Public Companies?

Infographic via Veracode

You should also check out Threatpost’s ongoing 5-part series with Veracode’s Fergal Glynn.

A CISO’s Guide To Application Security - Part 1: Defining AppSec

A CISO’s Guide To Application Security - Part 2: The Growing Threat to Applications

A CISO’s Guide To Application Security - Part 3: Toward an AppSec Center of Excellence

A CISO’s Guide To Application Security - Part 4: Weighing AppSec Technology Options

11:20am  |   URL: http://tmblr.co/Z1C9jxL2RRU_
  
Filed under: security apps technology 
April 30, 2012
Infographic via The Electronic Frontier Foundation
The Cyber Intelligence Sharing and Protection Act recently passed the U.S. House of representatives. The EFF was a vocal critic of the bill (before it was cool), and they put this graphic together. It concisely explains the shortcomings in the US Government’s latest attempt at reining in cybersecurity.

Infographic via The Electronic Frontier Foundation


The Cyber Intelligence Sharing and Protection Act recently passed the U.S. House of representatives. The EFF was a vocal critic of the bill (before it was cool), and they put this graphic together. It concisely explains the shortcomings in the US Government’s latest attempt at reining in cybersecurity.

April 24, 2012
Russian Mafia Organizes to Double Cybercrime Profits in 2011
Infographic via Group-IB
Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

Russian Mafia Organizes to Double Cybercrime Profits in 2011

Infographic via Group-IB

Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

April 24, 2012
Russian Mafia Organizes to Double Cybercrime Profits in 2011
Infographic via Group-IB
Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

Russian Mafia Organizes to Double Cybercrime Profits in 2011

Infographic via Group-IB

Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

April 3, 2012
When Good Websites Go Bad!
Infographic via Barracuda Labs
Over 10 million people were hit by exploits served up by 25,000 of the most popular websites in the world in February, according to a new study released by Barracuda Labs.
Read more at Threapost.

When Good Websites Go Bad!

Infographic via Barracuda Labs


Over 10 million people were hit by exploits served up by 25,000 of the most popular websites in the world in February, according to a new study released by Barracuda Labs.

Read more at Threapost.

March 27, 2012
A Visual Analysis of the Taidoor Trojan
via Symantec

A Visual Analysis of the Taidoor Trojan

via Symantec

March 23, 2012
2011 Sampling of Security Incidents by Attack Types, Time, and Impact
via IBM’s X-Force Trend and Risk Report
Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

2011 Sampling of Security Incidents by Attack Types, Time, and Impact

via IBM’s X-Force Trend and Risk Report

Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

February 28, 2012
Real hackers vs. movie hacker via SMBC

Real hackers vs. movie hacker via SMBC

February 27, 2012
Between MWC and RSA, Worlds of Mobility and Security Collide
Infographic via Juniper; Article via ReadWriteWeb
"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

Between MWC and RSA, Worlds of Mobility and Security Collide

Infographic via Juniper; Article via ReadWriteWeb

"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

February 22, 2012
Bad news about password management. 
via Help Net Security.
Makes me wonder whether the three character password used to hack that south Houston water treatment plant was a Siemens default?

Bad news about password management. 

via Help Net Security.

Makes me wonder whether the three character password used to hack that south Houston water treatment plant was a Siemens default?

Liked posts on Tumblr: More liked posts »