Press

2017

February 16, 2017 PC World Microsoft’s monthlong delay of patches may pose risks
February 15, 2017 CIO JavaScript-based ASLR bypass attack simplifies browser exploits
February 10, 2017 Daily Mail Arby’s investigates possible credit card data breach: Malware on cash registers could have affected more than 355,000 credit cards
February 9, 2017 CyberScoop While startups cashed in, total cybersecurity venture funding fell in 2016
February 8, 2017 eWeek Software Vulnerabilities Continue to Climb Despite Focus on Security
February 8, 2017 Bloomberg VC Firms Back Record Number of Cybersecurity Startups in 2016
February 8, 2017 The Merkle 41 New Software Vulnerabilities Reported Every Day Throughout 2016
February 8, 2017 Livemint Venture capital firms back record number of cybersecurity start-ups in 2016
February 6, 2017 CIO DIVE Bots, billions and breaches: Cybersecurity by the numbers
February 6, 2017 Dark Reading Vulnerabilities Hit High Water Mark in 2016
February 6, 2017 CyberScoop Report: Number of new software vulnerabilities flattening
February 6, 2017 ITWire Microsoft bugs showed rise in 2016: report
February 6, 2017 Becker’s Healthcare Report: 15k software vulnerabilities released in 2016
February 6, 2017 eWeek More Software Vulnerabilities Disclosed in 2016 Than Ever Before
February 6, 2017 Help Net Security Number of disclosed vulnerabilities reaches all time high in 2016
February 3, 2017 Network World Zero-day Windows file-sharing flaw can crash systems, maybe worse
February 2, 2017 TopWireNews Risk Based Security Appoints Sven Krewitt To VulnDB Research Team
February 1, 2017 HowStuffWorks NOW 2016 Broke the Record for Stolen Data
February 1, 2017 Infosecurity Magazine Crooks Raked in $16B via Identity Fraud Last Year
January 31, 2017 The Merkle 2016 Data Breaches Account For Over 4 Billion Stolen Records
January 31, 2017 DARKReading Over 4.2 Billion Records Exposed In 4,149 Breaches In 2016
January 30, 2017 JURIST Report: record number of data breaches in 2016
January 30, 2017 eWeek Yahoo Topped Record List of Data Breaches in 2016, Report Finds
January 30, 2017 NBC News More Than 4 Billion Data Records Were Stolen Globally in 2016
January 30, 2017 ZDNet Over four billion data records were stolen in 2016
January 30, 2017 Breitbart Report: More than 4B data files stolen worldwide last year, a record
January 28, 2017 International Business Times UK Data Privacy Day – 5 things you can do to keep your data from being hacked
January 27, 2017 eSecurity Planet 4,419 Data Breaches Exposed Over 4.2 Billion Records in 2016
January 27, 2017 SecurityWeek 4.2 Billion Records Exposed in Data Breaches in 2016: Report
January 27, 2017 WRBL Report: Most 2016 data breaches happened in US
January 27, 2017 Tribune-Review Carnegie Mellon privacy clinic aims to help protect you from hackers
January 27, 2017 Networks Asia Top data breach trends in 2016
January 26, 2017 WOODTV.com Report: Most 2016 data breaches happened in US
January 26, 2017 TripWire U.S. Top-Ranked Globally in 2016 Data Breaches, Finds Report
January 26, 2017 eWeek Yahoo Others Make 2016 a Record Year for Data Breaches, Report Finds
January 26, 2017 IT Business Edge Data Breach Numbers Hit Record Highs in 2016
January 26, 2017 Softpedia News Last Year’s Data Breaches Exposed 4.2 Billion Records, Most from America
January 26, 2017 Infosecurity Magazine US Leads World in Data Breaches
January 26, 2017 Infosecurity Magazine Global Orgs See 82K Cyber Incidents in 2016
January 26, 2017 iTWire Nearly half of 2016 data breaches in US: report
January 25, 2017 ISBuzz News US #1 In Data Breaches
January 25, 2017 Becker’s Healthcare Medical industry accounted for 9.2% of breaches in 2016
January 25, 2017 IT World Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
January 25, 2017 CircleID Data Breaches Reported During 2016 Exposed Over 4.2 Billion Records
January 25, 2017 Dark Reading Data Breaches Exposed 4.2 Billion Records In 2016
January 25, 2017 Low Cards United States Number One in Data Breaches
January 25, 2017 PRweb Online Trust Alliance Finds Consumer Data Breaches Level Off While Other Cyberattacks Skyrocket
January 25, 2017 The Hill Report: US leads world in data breaches
January 10, 2017 Dark Reading MongoDB Attack Shows Off Cyber Extortionists’ New Tricks

2016

December 29, 2016 CIO New year’s resolution for IoT vendors: Start treating LANs as hostile
December 14, 2016 SOFREP News Sailors’ personally identifiable information stolen by Ricky Ninja
November 17, 2016 Digital Journal Risk Based Security appoints Anthony Minnelli Director of Threat Intelligence
November 14, 2016 CBS Chicago Identity Thieves Laying Traps At Gasoline Pumps
November 3, 2016 CyberScoop What we can (and can’t) learn from the latest Shadow Brokers dump
November 3, 2016 Richmond Times-Dispatch ChamberRVA’s Innovation Award goes to Nutriati; Keiter and Workshop Digital given Impact Awards
October 31, 2016 TechNewsWorld Microsoft: Google’s Policy Endangers Windows Users
October 31, 2016 CIO Google clashes with Microsoft over Windows flaw disclosure
October 31, 2016 CyberScoop Shadow Brokers leak list of supposed NSA controlled computers in China, Russia
October 25, 2016 Softpedia Security Firm Tries Desperate Solution to Alert Company of Data Leak
October 23, 2016 Richmond Times-Dispatch Finalists named for ChamberRVA’s i.e* Innovation Award
October 21, 2016 SC Magazine Hacker ‘drags and drops’ 43.4 million Weebly user accounts in mega breach
October 18, 2016 SPAMfighter A Data Management Company Encounters Hack Losing Minimum 58m Personal Records
October 14, 2016 Wired Breach of Data Storage Company Exposes Personal Data from at Least 58.8 Million Accounts, if Not More
October 13, 2016 The Register Personal info on more than 58 million people spills onto the web from data slurp biz
October 13, 2016 Yahoo! Tech Data breach of data-management firm sees 58 million personal records stolen
October 13, 2016 Digital Trends Hacker steals at least 58 million personal records from data management firm
October 13, 2016 SC Magazine Unsecured database lets hacker expose 58 million plus records from data management firm
October 13, 2016 Hack Read Unsecured MongoDB Database: 58M Business Firm Accounts Leaked
October 12, 2016 Spiceworks Snap! Database breach exposes 58 million, researchers examine IoT security
October 12, 2016 ARS Technica Breach exposes at least 58 million accounts, includes names, jobs, and more
October 12, 2016 CSO Amazon resets customer passwords, while LeakedSource discloses massive update
October 11, 2016 Softpedia Hacker Steals 58 Million User Records from Data Storage Provider Read
September 23, 2016 DARKReading An Open-Source Security Maturity Model
September 22, 2016 CSO Over 6,000 vulnerabilities went unassigned by MITRE’s CVE project in 2015
September 12, 2016 ITWeb Connected cars shift insurance gear
September 1, 2016 Virus Guides Bogus Ransomware Hits Unprotected Redis Servers
August 31, 2016 Central Valley Business Times A billion files put at risk in first half of year, says cybersecurity report
August 31, 2016 Softpedia Redis Servers Targeted with Fake Ransomware
August 26, 2016 Engadget Untangling the NSA’s latest alleged embarrassment
August 23, 2016 Softpedia List of Equation Group Files Leaked by Shadow Brokers
August 21, 2016 LA Times NSA-linked hackers hoard malware secrets. What could possibly go wrong?
August 21, 2016 CIO Alleged NSA hackers probably gave away a small fortune by leaking exploits
August 19, 2016 South China Morning Post Hacking tools stolen from NSA show Chinese cyberfirms were targeted, experts say
August 18, 2016 Mashable All you need to know about the NSA-linked Equation Group hack
August 18, 2016 MIS-Asia Alleged NSA data dump contain hacking tools rarely seen
August 17, 2016 Petro Global News Shadow Brokers claims it hacked NSA, has access to NSA hacking tools Petro Global News
August 17, 2016 fedscoop Tech vendors admit stolen NSA cyber weapons are effective, warn customers
August 17, 2016 AP News ‘Auction’ of NSA tools sends security companies scrambling
August 16, 2016 International Business Times Who stole the NSA’s cyberweapons, what can they do and what will happen next?
August 16, 2016 fedscoop Experts: Exposed NSA cyber weapons posted for auction appear legit
August 16, 2016 PC World Suspected spycraft, not hacktivism, swirls around alleged NSA hack
August 16, 2016 The Guardian Hacking group auctions ‘cyber weapons’ stolen from NSA
August 16, 2016 Mother Jones It Looks Like the NSA Just Got Hacked
August 16, 2016 Business Insider Ex-NSA insiders: There’s ‘a lot of panic’ over what’s been exposed by this massive hack
August 16, 2016 IT World Suspected spycraft, not hacktivism, swirls around alleged NSA hack
August 16, 2016 IBTimes Who stole the NSA’s cyberweapons, what can they do and what will happen next?
August 15, 2016 Computer World NSA hacked? Top cyber weapons allegedly go up for auction
August 15, 2016 Fedscoop Hackers claim to have stolen offensive cyber weapons from NSA
August 15, 2016 Softpedia Shadow Brokers Group Auctions Off Supposed NSA Hacking Tools
August 15, 2016 ArsTechnica Group claims to hack NSA-tied hackers, posts exploits as proof
August 13, 2016 The Merkle Troyan Virus Turns Linux Servers into Bitcoin Miners
August 9, 2016 Softpedia Linux Trojan Mines for Cryptocurrency Using Misconfigured Redis Database Servers
August 4, 2016 Inverse Not Going to DEF CON? 5 Things to Watch From the Hacker Con
August 3, 2016 Digital Journal DVI Communications & Risk Based Security Join Forces to Provide Cybersecurity Management Services
July 15, 2016 Softpedia Thomson Reuters World-Check Terrorist Database Goes Up for Sale on the Dark Web
July 7, 2016 Softpedia Over 6,000 Redis Database Servers Ready for the Taking
July 4, 2016 IndiaTV Websites on target, hackers lay siege to 25,000 CCTV cameras
June 29, 2016 CSO Online Wormable flaws in Symantec products expose millions of computers to hacking
June 28, 2016 CIO Thousands of hacked CCTV devices used in DDoS attacks
June 16, 2016 InfoWorld Hack the hackers: Eavesdrop for intel on emerging threats
June 10, 2016 DARKReading The End Of A Security Decade — And The Beginning Of A New One
May 26, 2016 Ekstra Bladet (DK) Smager deres egen medicin: 1200 danske hackerprofiler afsløret
May 26, 2016 Computerworld (DK) Datalæk fra kæmpe hackerforum: 1.200 danske hackerprofiler afsløret
May 24, 2016 Libertatea (RO) Culmea furtului! Hackerii au atacat un site al unei comunități de… hackeri
May 20, 2016 ZDNet Cabcharge data exposure highlights need for mandatory breach notifications
May 19, 2016 ChannelNews Cabcharge Database Hacked
May 19, 2016 ITWeb More organisations opt for cyber liability insurance
May 19, 2016 DARKReading Epic Security #FAILS Of The Past 10 Years
May 19, 2016 BetaNews Popular hacking site Nulled hit by cyberattackers, user info leaked
May 18, 2016 Motherboard This Fake Hitman Site Is the Most Elaborate, Twisted Dark Web Scam Yet
May 18, 2016 The Register Cabcharge trip logs exposed by security-free database probe
May 18, 2016 Neue Zürcher Zeitung (CH) Forum für gestohlene Nutzerdaten – Datendiebstahl bei Nulled.io
May 18, 2016 Jurnalul.ro (RO) Un hacker a spart un site al unei comunităţi de… hackeri!
May 17, 2016 BBC News Hackers’ website breached by hacker
May 16, 2016 Threatpost Info on 500K Users Doxxed in Hacking Forum Dump
May 14, 2016 Softpedia Famous Nulled.io Hacking Forum Suffers Devastating Data Breach
May 13, 2016 International Business Times Hitman for hire: How the dark web contract-killer site BesaMafia was exposed by a hacker
May 13, 2016 Ars Technica Breach of Nulled.io crime forum could cause a world of pain for members
May 11, 2016 Bank Info Security Verizon Breach Report Criticized
May 6, 2016 Government Technology NSA Discloses Hundreds of Hardware, Software Bugs Per Year
April 13, 2016 PCWorld FBI reportedly bought exploit from hackers to access San Bernardino iPhone
April 12, 2016 TechWorm Anonymous Resume Operations in Italy By Hacking Italian Job Portals
April 11, 2016 The Hill Overnight Cybersecurity: EU regulators’ judgment on data deal coming soon
April 10, 2016 Softpedia Anonymous Resumes Operations in Italy with New Massive Hack
April 9, 2016 Softpedia Syrian Government Hacked, 43 GB of Data Spilled Online by Hacktivists
April 5, 2016 FocusRH Le bulletin de paie “dans le nuage” : un orage qui peut être évité
April 01, 2016 SCMagazine Threat of the month: April 2016
March 25, 2016 ZDnet Badlock, another ‘major’ security bug that puts profits before patches
March 25, 2016 San Francisco Chronicle CVE, a key cybersecurity resource, is at risk inside and out
Mar 25, 2016 InfoWorld The Badlock bug: Start your patch prep today
March 24, 2016 Wired Hype Around the Mysterious ‘Badlock’ Bug Raises Criticism
March 23, 2016 ComputerWorld Prepare to patch a critical flaw in Windows and Samba file sharing
March 23, 2016 Softpedia Bugfix for Overhyped Badlock Windows & Samba Flaw Coming in April
March 23, 2016 SecurityWeek Microsoft, Samba Preparing Patch for Severe “Badlock” Flaw
March 23, 2016 CSO Online Company behind the Badlock disclosure says pre-patch hype is good for business
March 17, 2016 SecTor How Safe Is Your Antivirus Software From Attack?
March 17th, 2016 formtek Security: No End In Sight to Massive Data Breaches in 2016
March 17, 2016 ThreatPost Mitre Takes On Critics, Set To Revamp CVE Vulnerability Reporting
March 15, 2016 Softpedia An Inventory of What Was Taken in the Staminus Data Breach
March 14, 2016 The Register Ironic: CCTV systems slide open a backdoor into your biz network
March 14, 2016 International Business Times Staminus hack: 2,300 customers impacted as CEO admits cyberattack
March 10, 2016 InfoWorld OpenSSL flaw disclosure: Right thought, wrong time
March 2, 2016 CSO Six questions: A brief Q&A on threat intelligence
February 22, 2016 ITWeb Looking into cyber risk insurance
February 19, 2016 Softpedia RaySharp DVRs Come With Hard-Coded Root Password
February 19, 2016 Naked Security by Sophos DVR snaps stills from CCTV surveillance and sends them to China
February 18, 2016 Naked Security by Sophos More IoT insecurity: The surveillance camera that anyone can log into
February 18, 2016 The Register 519070 or blank: The PINs that can pwn 80k online security cams
February 17, 2016 CSO Hard-coded password exposes up to 46,000 video surveillance DVRs to hacking
February 10, 2016 eWeek IRS Confirms It Was a Victim of an Automated Attack
February 10, 2016 San Francisco Chronicle Site that had alleged FBI and Homeland Security data is now down
February 9, 2016 Credit Union Times Breaches Infest C-Stores, Gas Stations: Study
February 9, 2016 Petrol Plaza Gas stations, c-stores most hit by data breach, says latest study
February 5, 2016 Executive-People (NL) Nog nooit vonden zoveel datalekken plaats als in 2015
February 4, 2016 CSP Which C-Stores, Oil Cos. Top Data Breach List?
February 3, 2016 DARKReading Passwords, Email Addresses, Were Most Stolen Data In 2015
February 3, 2016 CSP Top 10 States Data Thieves Like Best
January 29, 2016 PR Newswire Registration Open for Rock Stars of Risk-Based Security, East Coast
January 26, 2016 DARKReading Insurers Getting Smarter About Assessing Cyber Insurance Policy Risks
January 14, 2016 SC Magazine UK How can security vendors reduce their own attack surface?
January 8, 2016 CSO Antivirus software could make your company more vulnerable
January 6, 2016 eWeek Linode Resets Passwords as DDoS Attacks Continue

2015

December 4, 2015 ECT News Network VTech Hires Mandiant to Shore Up Security for Kids
December 3, 2015 CSO Outlook Top 10 Vulnerability Management Solution Provider 2015 – Risk Based Security Page 27
November 30, 2015 eWeek VTech Breach Exposes 5 Million Kids and Their Parents to Risk
November 29, 2015 Albany Herald How safe is your data in Georgia?
November 24, 2015 CSO Five reasons why hackers easily get in
November 11, 2015 ComputerWorld Thousands of Java applications vulnerable to nine-month-old exploit
November 11, 2015 DarkReading Federal Government Most Prone To Repeat Breaches
November 4, 2015 Richmond Times-Dispatch Hardywood Park Craft Brewery and Luck Cos. named 2015 Impact Award winners
October 21, 2015 Canadian Underwriter.ca Insurance industry needs to better understand the consequences of large aggregation scenarios: AIR Worldwide
October 16, 2015 eWeek A Look at Yahoo’s Promise of a Password-Free Email Service
October 15, 2015 Finance Magnates Firms Cannot Afford to Ignore the Dangers of Cyber Security Non-Compliance
October 11, 2015 SFGATE Will Barbie be hackers’ new plaything?
October 2, 2015 eWeek 15 Million T-Mobile Customers at Risk Thanks to Experian Breach
September 30, 2015 Politco Hackers targeted Hillary Clinton’s email account
September 24, 2015 eWeek OPM Says Far More Fingerprint Data Stolen Than First Reported
August 28, 2015 SecurityWeek Moxa Patches Flaws in Industrial Ethernet Switches
August 28, 2015 isssource.com Moxa Fixes Buffer Overflows
August 17, 2015 Philly.com Demand for jobs high in cyber security
August 14, 2015 Insurance Business America Department of Homeland Security reveals top sector at risk for cyber attacks
July 23, 2015 PCWorld Researchers disclose four unpatched vulnerabilities in Internet Explorer
July 7, 2015 PCWorld Researchers find previously unknown exploits among Hacking Team’s leaked files
June 26, 2015 CIO Software developers are failing to implement crypto correctly, data reveals
June 24, 2015 PCWorld Critical flaw in ESET products shows why spy groups are interested in antivirus programs
June 5, 2015 American Marketing Association Broaching a Data Breach
May 28, 2015 Naked Security (Sophos) We don’t cover stupid, says cyber insurer that’s fighting a payout
May 25, 2015 CIO Review Page 56-57: Third Party Code: Should CIO’s FREAK Out About a Broken HeartBleed?
May 19, 2015 CSO Hard-coded credentials placing dental offices at risk
May 13, 2015 CIO Critical VM escape vulnerability impacts business systems, data centers
May 12, 2015 Consumer & Retail Advisor Spotlight on 2015: Trends and Issues in Retail
May 6, 2015 ITWorld Companies are falling behind on securing their SAP environments
May 1, 2015 CFO Threat Assessment
April 24, 2015 SC Magazine RSA 2015: Bug bounties – accepted but concerns remain
April 20, 2015 ZDNet Signal above the noise: Compelling RSA 2015 sessions
April 17, 2015 Le Monde.fr Cinq questions sur la publication par WikiLeaks des données volées de Sony Pictures
April 15, 2015 CSO How to get CVSS right
April 8, 2015 CMSWire.com Why You Need to Scan for Open Source Vulnerabilities
April 7, 2015 SD Times Black Duck Software and risk-based security partner to launch the Black Duck Hub to address security vulnerabilities
April 1, 2015 SCMagazine Threat of the Month: Komodia libraries
March 30, 2015 CFO What’s the Cost of a Cyberattack?
March 11, 2015 The Conversation Trust (UK) The first 72 hours are critical for hacking victims
March 3, 2015 Tanzania Daily News Tanzania: Cyber Attacks – Why Companies Need to Strengthen Surveillance
March 1, 2015 The Register BitDefender bit trip slaps ‘valid’ on revoked certs
February 26, 2015 PCWorld Some Bitdefender products break HTTPS certificate revocation
February 26, 2015 CheckMarx.com LTD 16 CISOs and Security Leaders You Should be Following on Twitter
February 26, 2015 SYS-CON MEDIA Cloud Monetization and the ‘Internet of Things’
February 25, 2015 ZDNet.de Kritische Samba-Lücke gepatcht
February 24, 2015 Computerworld Critical remote code execution flaw patched in Samba
February 24, 2015 The Globe and Mail Companies are falling short in efforts to counter cyberattacks: report
February 23, 2015 SYS-CON MEDIA The Bigger the Base the Larger the Blast Radius
February 19, 2015 Techvibes Why Apple and Microsoft are Upset About Google’s ‘Project Zero’
February 12, 2015 Bidness Etc Google Inc Gives Apple, Microsoft 90 Days To Fix Security Flaws: Bloomberg
February 12, 2015 The Hill Google to tech firms: Fix your security flaws or we’ll expose them
February 11, 2015 Bloomberg Google Riles Silicon Valley by Exposing Others’ Security Flaws
February 4, 2015 RiskMarket News Willis Fires First Salvo in the Cyber Risk Model Race
January 13, 2015 Independent Retailer Authenticity Through Biology: Biosignature
January 6, 2015 Telegraph Mobile revolution: never underestimate the hackers
January 5, 2015 TechWorld Think that software library is safe to use? Think again…
January 3, 2015 VentureBeat The biggest security debacles of 2014 show that enterprises are still failing at the basics

2014

January 5, 2014 Wall Street Journal Wanted: More Vigilance on Data Security
January 6, 2014 BITS – NYT Palo Alto Networks Acquires Start-Up Morta Security
January 29, 2014 KnoxvilleBiz In data-heavy economy, breaches unlikely to end
January 31, 2014 Tampa Bay Times Target credit card breach breeds worry
February 21, 2014 Bankers Online High ranking data theft
March 1, 2014 Bugcrowd Blog Marisa’s RSA Conference Week In Review
March 12, 2014 PC World NSA’s plans reportedly involve infecting millions of computers with surveillance malware
March 19, 2014 CSO Secunia vulnerability report questioned by experts
March 19, 2014 PC World Prominent security mailing list Full Disclosure shuts down indefinitely
March 25, 2014 SCMagazine UK Anonymous Ukraine leaks seven million credit card details
April 1, 2014 SCMagazine Threat of the month: Linksys router zero-day
April 3, 2014 CBR 158,000 USERS’ DATA ‘COMPROMISED IN SAMSUNG BOXEE.TV HACK’
April 3, 2014 PC World Users face serious threat as hackers take aim at routers, embedded devices
April 9, 2014 New York Times Users’ Stark Reminder: As Web Grows, It Grows Less Secure
April 10, 2014 BITS NYT 2 Regulators Issue Guidelines on Sharing Cyber Security Information
April 11, 2014 Network World Don’t overlook URL fetching agents when fixing Heartbleed flaw on servers, researchers say
April 11, 2014 CrowdCurity Blog The history of bug bounty programs
April 21, 2014 ZDNet Hackers attack Spokeo, UN Civil Aviation Org in nine-site crime spree
April 22, 2014 Chicago Tribune Family finances: Protect your identity
April 23, 2014 BrianLehrer.tv This land is your land, under an oligarchy
April 24, 2014 CIO / CSO Apple Users Put At Risk By 3-week Delay Between OS X and iOS Patches, Researchers Say
April 25, 2014 GMA News Ex Apple employee claims ‘delayed’ iOS patch left iPhone users vulnerable
April 29, 2014 Insurance Business America One sector especially at risk for cyber attacks, new report says
May 16, 2014 ICS-CERT ICS-CERT Monitor – January – April 2014
May 22, 2014 PropertyCasualty360 Cyber: Rising Interest, Insurers’ Response and Fears of a Mega Breach
May 22, 2014 Business Insurance Don’t use terrorism as model to analyze cyber threats: ISA head
May 23, 2014 Politico W.H.: No new regulations necessary – WaPo: Chinese indictments part of broad strategy – Scooplet: DHS chief steps down
June 1, 2014 BloombergView Why Hacking Keeps Getting Worse
July 16, 2014 eWeek Researchers Track Spread of Security Flaws in Software Libraries
July 22, 2014 ThreatPost Third-Party Software Library Risks To Be Scrutinized at Black Hat
July 25, 2014 CNN Money Your personal information just isn’t safe
August 1, 2014 Information Age Information-centric security: Protecting data from the inside out
August 2, 2014 Digital Journal Interview: A man who knows how to steal your credit card data
August 5, 2014 Today Online Ministries, stat boards must beware reliance on third parties
August 8, 2014 News3 Hackers meet at Black Hat convention to tackle cybersecurity risks
August 8, 2014 Bugcrowd Blog DEFCON Bug Bounty Talks
August 11, 2014 MIT Technology Review Black Hat: More Internet-Scale Bugs Are Likely Lurking
August 26, 2014 Advisen Report sees 2014 overtaking 2013 in number of breaches
August 28, 2014 Virtual Strategy Magazine Businesses Need to Protect Against Hackers
August 28, 2014 PCWorld Australia Vulnerabilities on the decline, but risk assessment is often flawed, study says says
September 3, 2014 The Atlanta Journal-Constitution Experts say Home Depot data breach widespread
September 4, 2014 PCWorld Twitter launches bug bounty program
September 10, 2014 Forbes When It’s A Good Idea To Invite An Army Of Hackers To Attack You
September 24, 2014 New York Magazine The Rise of the Hacker Bounty Hunter
October 20, 2014 DARK Reading Why You Shouldn’t Count On General Liability To Cover Cyber Risk
October 23, 2014 DARK Reading 10 Things IT Probably Doesn’t Know About Cyber Insurance
October 27, 2014 CSO Vulnerability in widely used ‘strings’ utility could spell trouble for malware analysts
November 17, 2014 CIO Nearly a Billion Records Were Compromised in 2014
November 24, 2014 FedScoop Commentary: Cyber threats demand executive not just IT skills
December 2, 2014 American Banker Eight Lessons for Banks from the Data Breaches of 2014
December 9, 2014 American Banker Growing List of Firms Works to Solve Banks’ Digital Identity Crisis
December 9, 2014 Help Net Security Sony hackers apparently wanted money
December 10, 2014 Naked Security Sony tormentors leak celebrities’ phone numbers, aliases
December 10, 2014 TechWorm Sony Hack Attack : Hackers had Demanded Ransom from Sony Three Days Prior to Attack
December 11, 2014 Stuff.co.nz Eight lessons from the Sony Pictures hack
December 12, 2014 USA Today New Sony files include staff info, financial forecasts
December 16, 2014 The Register Sony hackers dump more hunks of stolen data, promise another ‘Christmas gift’
December 19, 2014 LA Times The Sony hack: What if it isn’t North Korea?
December 19, 2014 Council on Foreign Relations Cyber Week in Review: December 19, 2014
December 19, 2014 Bloomberg View Benner on Tech: Hollywood Cowardice, Apple Workers and Anonymity

2013

January 11, 2013 ComputerWorld Firefox adds built-in HTML5-based PDF viewer to improve security
February 8, 2013 IT World Critical vulnerability in cURL library could affect large number of applications
March 14, 2013 InfoWorld Java’s security problems unlikely to be resolved soon, researchers say
March 19, 2013 Dark Reading Security-Bug Rating System Gets A Makeover
May 2013 National Protection and Programs Directorate, Department of Homeland Security Cyber Risk Culture Roundtable Readout Report
May 13, 2013 Security Week SCADA Vulnerabilities in Rockwell and Schneider Products Disclosed
May 30, 2013 ComputerWorld Google wants software vendors to respond to vulnerabilities within 7 days
July 30, 2013 SCMagazine BlackBerry purportedly sending users’ email credentials in cleartext
July 31, 2013 SCMagazine UK BlackBerry reported to FBI over potential privacy and security issues
September 12, 2013 Insurance Business America Security expert clashes with carriers over data breach action
October 1, 2013 Insurance Business America Deft hand required for challenging cyber insurance market
November 13, 2013 EHackingnews DefCamp 2013 : International hacking and information security conference in Romania
December 11, 2013 SecuaBit Episode 122: Risky Bitcoin Insurance!
December 31, 2013 PC World The security industry found its dream enemy in 2013. And new technical challenges, too