Eurostar Customers Reset Passwords After Security Breach

/
Eurostar forced all of its customers to reset their passwords after indications of a possible breach by hackers attempted to access user accounts.

Continuous Monitoring : Academic Paper

/
The Federal Information Security Act (FISMA) of 2002 requires that government agencies report on their Information Technology Security Status annually to the Office of Management and Budget (OMB).

Armis Discovers “BLEEDINGBIT,” Two Critical Chip-Level Vulnerabilities

/
Armis, the enterprise IoT security company, today announced the discovery of two critical vulnerabilities related to the use of Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI), and used in Cisco, Meraki and Aruba wireless access points, called "BLEEDINGBIT."

UK needs to talk to China to ensure cybersecurity

/
As the UK’s cybersecurity situation becomes more uncertain and vulnerable day by day, top cyber intelligence officers have spoken out about seeking alternative arrangements to ensure a more protected digital environment across the country.

Cybersecurity Career Pathway

/
There are many opportunities for workers to start and advance their careers within cybersecurity.

National Cybersecurity Career Awareness Week

/
The National Cybersecurity Career Awareness Week (NCCAW), brought to you by the National Initiative for Cybersecurity (NICE), is a week-long campaign focused on increasing awareness about careers in cybersecurity and building a national cybersecurity workforce to enhance America’s national security and promote economic prosperity.

CVE-2018-17914

/
InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2.

Complementing a Security Management Model with the 20 Critical Security Controls: Academic Paper

/
The complexity and velocity of the threats organizations are facing are only escalating and there is a definite need for careful analysis of the attack trends to determine effective mitigations.

Attack Overview – Video

/
There are generally two reasons an individual or an organization is attacked. One, you are specifically targeted or two, you are a target of opportunity.

The SecurityOrb Show – An Interview with Haiti CyberCon Co-Founder Michel Arbrouet

/
HaitiCyberCon is an InfoSec/Hacker conference for professionals and enthusiasts alike located in Haiti, offering training as well interesting and inventive talks and workshops.