Palo Alto Networks joined as sponsor for Security World 2014

Palo Alto Networks joined as sponsor for Security World 2014

Being held in Vietnam for seven consecutive years since 2007, Security World has gained its recognition as a prestigious unique national forum where officers from Ministry of Public Security update and seek security technologies for the Ministries and Government’s ongoing projects. It also served as a meeting point for enterprises from Banking, Finance, Telecommunication, E-commerce, [...]

Cyber threats to Windows XP and guidance for Small Businesses and Individual Consumers

Cyber threats to Windows XP and guidance for Small Businesses and Individual Consumers

It’s been well publicized that on April 8th, 2014 Microsoft discontinues product support for Windows XP.  Released in 2001, the support policy for the life of Windows XP soon followed in October 2002.  In September 2007, we announced that support for Windows XP would be extended an additional two years to April 8 2014.  We [...]

Addressing Cyberattacks via Positive Enforcement Model

Addressing Cyberattacks via Positive Enforcement Model

Stop Playing Whack-A-Mole with Advanced Threats As more and more details about the Target breach have emerged, security experts, bloggers and media have focused on on why Target failed to react to alerts from zero day malware point products that allegedly provided indication there was malware in the network. According to a Bloomberg BusinessWeek article, a team [...]

(ISC)² is 25 This Year: So What’s Ahead for the Organization?

(ISC)² is 25 This Year: So What’s Ahead for the Organization?

W. Hord Tipton (ISC)² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth? The field has changed dramatically since 1989, when the International Information Systems Security Certification Consortium was established as a not-for-profit entity dedicated toeducation. When [...]

The Cybersecurity Canon: The Girl with the Dragon Tattoo

The Cybersecurity Canon: The Girl with the Dragon Tattoo

  For the past decade, I have had this notion that there must be a Cybersecurity Canon: a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in a cybersecurity professional’s education. I presented on this topic at [...]