8 top cyber-attack maps and how to use them

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used. Read […]

Spam email remains a potent threat tool for hackers

Online criminals are keeping the faith with spam email campaigns, with more and more nuisance messages being sent today than ever before. Figures from IBM have shown that spam email remains a key tool for hackers, with the volume of such messages increasing 400 per cent in the past year. Read about the latest report by […]

9 of the Biggest Bug Bounty Programs

Bug bounty programs have become an increasingly popular way for organizations to find and fix vulnerabilities in their software and services. Until relatively recently it was mainly the software companies and technology firms that employed the tactic. Read/see the slideshow explaining the nine biggest bug bounty programs on Dark Reading.

8 guiding principles for establishing an enduring cyber security program

Read Anthony Bargar’s article about eight guiding principles on which companies can establish a good cyber security program on Enterprise Innovation : We have all seen the headlines and read the stories about how organizations fail to apply basic security practices– and ‘somehow’ expose sensitive data, or suffer interrupted business causing chaos and a loss […]

Engage Cognitio to reduce your security spend, mitigate risks and increase compliance

Cognitio is a strategic consulting and engineering firm with a operating across multiple sectors of the economy. We are known for our ability to help firms mitigate risks and increase compliance while optimizing security spend. Cognitio helps clients improve defenses by: CISO as a Service: Strategic leadership for your corporate security program CTO as a […]

NIST issues ‘next-generation’ draft guidance for IoT integration

The National Institute of Standards and Technology (NIST) has issued its fifth revision of security and privacy guidance that includes a new focus on Internet of Things vulnerabilities. Read about the new NIST guidelines for Internet of Things integration on Fierce Healthcare.

Protecting Smart Buildings from Cyber Attacks

Read Alan Mihalic article about protecting smart buildings from cyber attacks on Engineering : It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an […]

Why aren’t European cities working harder to improve their security infrastructure?

In spite of a dozen vehicle attacks, European cities aren’t moving quickly to improve their security infrastructure. Security experts and local officials say they worry about the costs, the aesthetics, the disruptions to everyday life, and the speed at which terror tactics evolve and make existing security measures obsolete. Read more about the Europe’s security […]

Understanding the security implications of the U.S. Navy collisions

A series of accidents at sea has left the U.S. Navy short of two missile-equipped Aegis destroyers. The collisions have not only cost lives and taken critical ships out of commission; they may also stretch resources and impair the Navy’s ability to conduct the training it needs to avoid such disasters in the future. Read […]

Your liability and terrorism insurance may not be enough

Workplace violence is a real and growing threat. Unfortunately, most general liability policies do not cover active shooter incidents and other acts of violence. Even terrorism insurance will not cover an attack unless the Secretary of the Treasury has officially labeled the incident an act of terrorism. Read more about the limits of general liability […]