By: - Independent Computer Security Analyst

@gcluley

Security Tips for Football World Cup Fans

June 13th, 2014

The FIFA World Cup has kicked off in Brazil, with fans travelling to the country from around the globe in the hope that their country’s football team will make it to the grand final. But if you’re travelling (whether it be to South America watch the world’s greatest soccer tournament, or a couple of days […]



By: - Senior Architect

@danteal

People Are Your Last Line of Defense

April 29th, 2014

The increasing numbers of attacks profiled in news reports over the last several months demonstrate that we live in an unsecure world.  The Target breach in particular shows how important a complete cyber security program is to an enterprise network environment.  Target’s security systems generated events from the attack, but the events were not followed […]



By: - Independent Computer Security Analyst

@gcluley

Who Does China Blame for a Third of All Cyber Attacks Against It? The USA

March 31st, 2014

A few years ago, in what we call the BS era (“Before Snowden”), there were frequent accusations levelled against China for attempting to hack into foreign country’s computer systems and steal information. And, to be fair, there was often good reason to suspect that some attacks were conducted with the endorsement of the Beijing authorities. […]



By: - Technology Reporter

@jleclaire

The Real Infosec Employee Shortage

March 19th, 2014

When a company like HP offers up a $250,000 grant to attract IT security workers to the field, you know there’s a backstory. In this case, HP’s Scholarship for Women Studying Information Security (SWSIS) program hopes to prime the pump of IT security workers entering the market. The shortage is real—and critical. The IT security […]



By: - IT Secured. Success Optimized.

@_lumension

Retail POS Cyber Attacks: Why, How and What to Do

March 18th, 2014

Here’s a quick look at how cyber thieves attack retail organizations, some thoughts on why and best practices for defending against them.



By: - IT Security Expert, Author

@stiennon

We Thought We Understood How to Defend Against Targeted Attacks

March 12th, 2014

The lesson to be learned from the content of Snowden’s documents released to date is that the NSA has built a global capability to execute on a plan of information dominance for intelligence gathering. Ostensibly to collect enough communications meta data and content to deter, disrupt, and destroy terrorists and their plans, the NSA’s capabilities […]



By: - Dir. Solutions Marketing

POS System Pwnage

March 5th, 2014

Perhaps there have been bigger breaches, but the Target breach in late-2013 certainly seems to set off a firestorm. There are literally thousands of new online articles and posts everyday covering the event – the who, what, where, when, and especially the how and “what now” aspects of the case – and we’re certainly not […]



By: - Technology Reporter

@jleclaire

After Target Breach, How Can You Ensure Vendors Aren’t Your Weak Link?

February 20th, 2014

Shocking. That’s one of the best words to describe the feeling among many retail industry watchers when the root of the massive Target breach was determined to be an HVAC contractor. Indeed, news headlines continue to examine all aspects of the story, from the $200 million it cost to replace credit cards, to reports of […]



By: - Dir. Solutions Marketing

Ain’t No Style Points in Infosec

February 19th, 2014

It’s Winter Olympics time. I love watching them, especially safely ensconced in the American Southwest where we don’t have to deal with the snow and ice associated with the winter sports. Speed skating, (real) Biathlon, Hockey, Downhill and XC skiing, and all the rest of it. But my friend the sports curmudgeon complains about sports that rely on […]



By: - Former Chairman and CEO, Lumension

@pclawson

Social Media: the Bad Guys’ Perfect Playground

October 1st, 2013

October marks the 10th anniversary of National Cyber Security Awareness Month, a public education campaign spearheaded by our colleagues at the National Cyber Security Alliance. It’s somewhat disheartening to consider the lack of progress made in cyber security over the last 10 years; cyber criminals continue to wreak havoc stealing personal identities, corporate IP, and […]


By: - Former Chairman and CEO, Lumension

@pclawson

Advice for the Incoming DHS Secretary

September 12th, 2013

A few weeks after retiring Department of Homeland Security Secretary Janet Napolitano gave a farewell speech, we are still unclear on her replacement unfortuntely. In that departure speech, Napolitano advised her successor “You will need a large bottle of Advil.” Given the DHS Secretary is responsible for dealing with everything from natural disasters to terrorists attacks, […]


By: - Sr. Pre-Sales Technical Consultant ANZ, Lumension

Google Password Insanity?

August 27th, 2013

Reported as a security flaw in Google Chrome by The Guardian in early August, passwords saved in the browser could be easily accessed by someone other than you. And we have advised Optimal Security readers to stop saving passwords in the browser. While good advice for sure, we should also concern ourselves with physical security. […]


By: - IT Security Expert, Author

@stiennon

Three Lessons Learned From the NSA’s Use of Big Data and Security Analytics

August 14th, 2013

Security analytics is the term being applied to the new methods being developed to counter sophisticated targeted attacks. The idea is simple but implementation requires skill sets that have yet to be acquired by most organizations. Gather as much data as possible, apply filters derived from security intelligence, and identify attacks in progress or already […]


By: - Dir. Solutions Marketing

Beware of the Crapper Hacker

August 5th, 2013

News late last week from Trustwave of a security vulnerability in a new line of Japanese toilets. And while funny in its own way, it does serve as a warning for manufacturers and consumers alike as we move into an even more connected world. As everyone probably knows, Japanese toilets are a modern technological marvel. […]


By: - Dir. Solutions Marketing

Whitehat Lessons from $300M Cyber Crime Spree

July 30th, 2013

By now you’ve read about the new indictment of five hackers from Russia and Ukraine in what is being called the “largest data breach scheme in the US.” You can read the DOJ press release here and/or a redacted copy of the indictment here [PDF]. In what is really a continuation of the Albert Gonzalez […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com