Security Bytes:

March, 2012

March 29, 2012  12:02 PM

Future of SIEM market hinges on lessons learned from past mistakes

Posted by: Jane Wright

This week I was researching the current state of the SIEM market, and I was pleasantly surprised to see the progress that has been made in many SIEM products. ...

March 28, 2012  3:16 PM

Verizon DBIR sheds some light on cloud computing breaches

Posted by: Marcia Savage
breaches, cloud computing breaches, DBIR 2012

Cloud computing breaches often are a topic that comes up in conversations at conferences. Organizations need to prepare for the...

March 27, 2012  7:11 PM

Isolated Facebook attacks illustrate need for social media security

Posted by: Robert Westervelt
Facebook Worm, Information Security Threats, social networking flaws

Social networking security threats have taken a back seat to mobile security and targeted attacks directed at corporate networks in recent years. But there is news of two new

March 26, 2012  2:36 PM

ISP’s anti-botnet code of conduct does little for botnet prevention

Posted by: maxsteel
botnet prevention, botnet removal, FCC, ISPs

Those of you clamoring for Internet service providers to get proactive about security and malicious activity on their networks got a win late last week from the Federal Communications Commission. The FCC’s Communications Security, Reliability and Interoperability Council...

March 23, 2012  7:20 AM

Microsoft vows to improve cloud service after Azure outage

Posted by: Marcia Savage
Azure cloud service, cloud, Cloud computing

Cloud outages are always big news -  and for good reason, because they usually affect many people. Last month's Microsoft

March 22, 2012  11:41 AM

Verizon data breach report 2012 edition boasts more new contributors

Posted by: Jane Wright
breaches, security industry, Verizon DBIR

Last week I blogged about security practitioners and other IT pros working together across companies and industries to stem security threats. A new report this week is a...

March 21, 2012  4:28 PM

Mobile device protection: OWASP working on a Top 10 mobile risks list

Posted by: Robert Westervelt
mobile device security, mobile security, Mobile security apps, mobile security plan, mobile security risks

When I arrived home from RSA Conference 2012 after attending a number of panel discussions about

March 19, 2012  8:07 PM

Duqu Trojan written by professional software development team

Posted by: maxsteel
C programming language, Duqu trojan, Kamluk, Kaspersky Labs

Researchers at Kaspersky Labs have determined the authors of Duqu, the remote access Trojan often linked to Stuxnet, used a custom version of the C programming language to write the module used to...

March 15, 2012  6:16 PM

NSA mobile security plan could be roadmap for all mobile device security

Posted by: Robert Westervelt
Android mobile security, mobile security, mobile security plan

March 15, 2012  2:51 PM

Can a security industry association bring us all together?

Posted by: Jane Wright
Andrew Rose, Arthur Coviello, FSISAC, RSA 2012, security information sharing

You don’t have to work in the infosec world for long before you hear strands of the unofficial industry anthem: "Let’s work together." Arthur Coviello, chairman of RSA, the security division of EMC, practically sang the chorus in his keynote address at

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: