Information, The Next Battlefield
Today the Information Security Arena has been shaken by two separate, although similar, events: IBM and McAfee, two giants in this troubled market, have separately decided to make a decisive move into...
View ArticleAdvanced Persistent Threats and Security Information Management
Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec landscape from both technology and market perspective. I...
View ArticleOne Year Of Lulz (Part II)
Christmas has just gone and here it is my personal way to wish you a Happy New Year: the second part of my personal chart (first part here) of Main 2011 Cyber Attacks covering the time window from...
View ArticleBrowsing Security Predictions for 2012
Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually happens in this period, information security professionals use...
View ArticleWhat Security Vendors Said One Year Ago…
I did not resist, so after publishing the summary of Security Predictions for 2012, I checked out what security vendors predicted one year ago for 2011. Exactly as I did in my previous post, at the...
View ArticleExclusive Infographic: All Cyber Attacks on Military Aviation and Aerospace...
Cross Posted from TheAviationist. 2011 has been an annus horribilis for information security, and aviation has not been an exception to this rule: not only in 2011 the corporate networks of several...
View ArticleThe Alphabet of Cyber Crime from APT to Zeus
If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have...
View ArticleJune 2012 Cyber Attacks Timeline (Part II)
Part I (1-15 June) at this link From an information security perspective, the second half of June has been characterized by the hacking collective UGNAZI (and its members) and also by an individual...
View ArticleHere’s Shamoon!
So, it looks like that the destructive impacts of the cyber attack targeting Aramco, where definitively true. In the same hours in which the first details about the malware were disclosed, Kasperky...
View ArticleBrowsing Security Predictions for 2013
The period between November and December is particularly interesting for the Infosec community, since nearly all the main security vendors use to unveil their predictions for the next year, trying to...
View ArticleSCADA Security: Bridge the Gap
Utilities and Security Vendors are taking very seriously the events of Stuxnet and they’re consequently running for cover. Although due to natural events, the dramatic facts of Fukushima have shown to...
View ArticleOther Considerations On TCP Split Handshake
The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors is far from being quiet. During these days I enjoyed speaking with many colleagues about the...
View ArticleSome Random Thoughts On The Security Market
The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts (USA) is simply the last...
View ArticleTop Security Challenges for 2011: Check Point’s Perspective
At the last Check Point Experience in Barcelona, the Israeli-based company unleashed its own Top Security Challenges for 2011. In a certain sense one might say that it could be quite easy for...
View ArticleThe Antivirus is Dead, Long Live the Antivirus!
The Google Chromebook (that is the first Chromium OS powered devices) was presented few days ago (and is ready to reach our shelves for the half of June), but only yesterday I accidentally came across...
View ArticleFive Years of Hacking (Updated)
Strange Days for Information Security, you may watch my July 2011 Attacks Chart for noticing how troubled July has been. August promises to be even worse, but this is not the point… The point is that...
View ArticleAugust 2011 Cyber Attacks Timeline (Part I)
Update Sep 2: August 2011 Cyber Attacks Timeline (Complete List) It looks like the Dog Days did not stop the Cyber Attacks, which have been particularly numerous during August. This is the reason why I...
View ArticleAugust 2011 Cyber Attacks Timeline
Here it is the complete list of Main Cyber Attacks for July: definitively it looks like the Dog Days did not stop the Cyber Attacks, which have been particularly numerous during August. Following the...
View ArticleProcessor Assisted Or OS Embedded Endpoint Security?
Yesterday, September the 13th 2011, the Information Security Arena has been shaken by a couple of announcements earthquakes unleashed by two of the most important players in this market. The first...
View Article16-30 June 2013 Cyber Attacks Timeline
It’s time for the second part of the June 2013 Cyber Attacks Timeline (first part here). The last two weeks of June have been characterized by an unusual cyber activity in the Korean Peninsula. In a...
View Article
More Pages to Explore .....