Survey for the CSA Top Threats to Cloud Computing 2015 report is Open

The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and provide anecdotes for these security concerns. The […]

Continue Reading

Aligning Entrepreneurship and Innovation Strategically Through Governance of Enterprise IT

The evolution of the enterprise has made it such that the reliance of IT is very important to meeting customers’ dynamic needs. Offering the best strategic solution to customer needs may not necessarily mean installing the latest IT products. Instead it may require combining several factors (risk, security, support, maintenance, cost, etc.) to deliver that […]

Continue Reading

Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan

In recent weeks, we have noticed changes in the TeslaCrypt ransomware malware family’s code base. OpenDNS recently discussed some of these changes regarding the encryption techniques in this newest variant. While reverse engineering the underlying code of these samples we discovered that the author of of TeslaCrypt borrowed code from the Carberp malware family in […]

Continue Reading

Meet AutoFocus!

Tired of sorting through endless logs to find the threats in your network that matter most? Meet AutoFocus! Our new threat intelligence service harnesses global threat data and spotlights meaningful and pervasive events, so that you can take action now. Ready to get started? Use the AutoFocus cheat sheet! AutoFocus Cheat Sheet Focus in on […]

Continue Reading
%d bloggers like this: