Monday, September 28, 2015

Understanding Espionage Tradecraft

Only by understanding the threats and the basics of the tradecraft utilized to facilitate industrial espionage can an organization develop an effective counterespionage program. This chapter from Industrial Espionage: Developing a Counterespionage Program by Daniel J . Benny reviews espionage tradecraft including the intelligence cycle, the categories of intelligence collection, and the methods of collection.

Wednesday, September 23, 2015

Travel Security: What to Know Before You Head to High-Risk Locales


Here's an interesting, timely, and short piece from IBM on travel safety.

I don't know if you've ever read Stratfor's guidance on personal security, such as "Taming Chaos with a Personal Plan," but this new book, Personal Security: A Guide for International Travelers, provides a comprehensive approach to personal security and safety when travelling, or even while at home. To support your pre-trip preparations, this chapter, "Before You Go," maps out expert advice and lessons from real life cases to give you insights into basic planning questions.

So, if you company doesn't have a Travel Security Team, or even if it does, get an little extra insurance with your personal copy of Personal Security: A Guide for International Travelers.

Monday, September 21, 2015

The 7 Deadly Sins of Incident Response


The 7 Deadly Sins of Incident Response

In today's cyber-society, where we are witnessing an endless barrage of attacks on government and enterprise networks, it is clear that organizations need to be more proactive when it comes to security and protecting themselves. Despite this, more companies are still committing the "7 deadly sins" when it comes to incident response. Taking this into consideration, this article highlights why it is important for companies to have a built in incident response function; lists the top 7 mistakes companies are making when attempting to build an incident response function; and provides tips for how to deploy an effective incident response function and keep your organization safe from attackers.

Thursday, September 10, 2015

Top 3 Factors Driving the Rise in Data Breaches



It comes as no surprise that the number of companies falling victim to data breaches is on the rise. These stories are making headlines, and making CEOs and employees alike nervous that they will be the next victim. As computers are getting faster, so are hacking attempts. Hackers are now more capable than ever to implement their plans. This article outlines the top three factors that are contributing to the rise of data breaches.

Thursday, September 3, 2015

McAfee Labs Threats Report: August 2015


In this report, a dozen thought leaders from Intel Security share their views on the changes they have witnessed in the cyberthreat landscape and the evolution of security technology over the past five years. The report also compares what really happened to what we thought would happen over the past five years—from new approaches to cyberattacks to the economics of cybercrime; details techniques cyberthieves use to exfiltrate valuable data, moving it from your network to theirs; and separates fact from fiction about potential malware attacks on graphics processing units (GPUs).