Backdoors and Breaches incident response card game makes tabletop exercises fun
New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise.
J.M. Porup | 07 Jan | Read more
New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise.
J.M. Porup | 07 Jan | Read more
A new report underscores the poor state of aviation security - and worse, how poorly understood the problem is within the industry.
J.M. Porup | 18 Dec | Read more
India's Kudankulam Nuclear Power Plant publicly admitted they discovered malware on their networks, which could have been easily avoided.
J.M. Porup | 10 Dec | Read more
Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank.
J.M. Porup | 20 Nov | Read more
A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues.
J.M. Porup | 08 Oct | Read more
Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project.
J.M. Porup | 27 Aug | Read more
Security rock stars? Fake science? This year's Black Hat had it all.
J.M. Porup | 16 Aug | Read more
According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.
J.M. Porup | 08 Aug | Read more
Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology.
J.M. Porup | 02 Aug | Read more
The U.S. is moving at glacial speed to secure election systems against possible interference by foreign adversaries. We're not even close to ready, and that could call contests into question.
J.M. Porup | 22 Jul | Read more
After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.
J.M. Porup | 10 Jul | Read more
IT services giant HCL left employee passwords exposed online, as well as customer project details, all without any form of authentication.
J.M. Porup | 21 May | Read more
A Congressional commission might soon recommend conscription of cybersecurity professionals to serve in both the military and civil service. Will the government force security pros to work for Uncle Sam?
J.M. Porup | 20 May | Read more
Avoid the siren song of big data and collect only what you need. This is the big takeaway from a 200-million record direct marketing list.
J.M. Porup | 14 May | Read more
Movies and TV shows have long influenced how lawmakers and society think about information security. We all have our personal favorite we're obsessed with. What's yours?
J.M. Porup | 29 Mar | Read more