Monday, August 25, 2014

Protecting Trade Secrets, Remote Worker Security, Mobile employees

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance | WeComply, a Thomson Reuters business - JDSupra:

Remote Worker Security -- Mobile employees using portable devices increase the potential for data loss in a variety of ways:
  • Transferring files from a work device to an unprotected home computer or personal device.
  • Using personal communications that don't meet corporate IT security standards.
  • Discussing sensitive company matters where others can hear the conversation.
  • Failing to use a laptop privacy guard when working remotely in a public place.
  • Failing to properly safeguard mobile devices against loss or theft.
  • Using hotel or other public "hot spots" where potential cybercriminals can steal information or establish a rogue network to steal information.

(read more at link above)

more news below (web link on mobile below)

Monday, August 18, 2014

Andreessen Horowitz, Cyber Security Firm Tanium (video)

Why Andreessen Is Investing $90M in Tanium: Video - Bloomberg:
(Allow video to load after clicking play or go to link above)
Steven Sinofsky, a board partner at Andreessen Horowitz, discusses the company's investment in cyber security firm Tanium with Cory Johnson on "Bloomberg West." Bloomberg LP, the parent of Bloomberg News, is an investor in Andreessen Horowitz. (Source: Bloomberg, June 23)

more news below (web link on mobile below)

Monday, August 11, 2014

FBI Fights Against Chinese Cyber-Espionage

Exclusive: Inside the FBI's Fight Against Chinese Cyber-Espionage: "SolarWorld was fighting a losing battle. The U.S. subsidiary of the German solar panel manufacturer knew that its Chinese competitors, backed by generous government subsidies, were flooding the American market with steeply discounted solar panels and equipment, making it practically impossible for U.S. firms to compete. What SolarWorld didn't know, however, was that at the same time it was pleading its case with U.S. trade officials, Chinese military hackers were breaking into the company's computers and stealing private information that would give Chinese solar firms an even bigger unfair advantage, including the company's pricing and marketing strategies..."

more news below (web link on mobile below)

Monday, August 4, 2014

Evolving Threat, Amplification DDoS Attacks

The Evolving Threat of Amplification DDoS Attacks | Between the Dots: "...The only real way to defend against attacks of this size is, unsurprisingly, massive network infrastructure that is engineered to withstand very large volumes of traffic.  Unfortunately, this isn’t how most customer networks are designed, and it’s certainly cost prohibitive for an organization to keep scaling up the network to match the ever-increasing size of these attacks. It’s an unwinnable arms race; attackers will always have access to more bandwidth than you. Leveraging a third-party cloud-based DDoS protection service like Verisign’s is likely to provide the best protection against these attacks. Our infrastructure is scaled and architected to defend against the largest-known attacks. Furthermore, we operate a fully redundant and interconnected network backbone to help ensure a massive attack doesn’t impact any one site or our ability to protect our customers...."

More info: For more information about DDoS trends, read Q1 2014 DDoS Trends report

more news below (web link on mobile below)

Cybersecurity - Google News

Malware - Google News

National Security - Google News

"Security Threats" - Google News

Maritime security - Google News

The State of Security

TSA - Google News

Homeland Security - Google News