All posts by Chris Tribbey

Cyber Risk Series: The Threat … The Response (WRIN.tv)

Stan Stahl, President Citadel Information Group, Inc. sat down with Marc Maiffret, who is the Chief Technology Officer at BeyondTrust, a leading security and compliance management ... More

Growing security threats put focus on CISO role (Fierce CIO)

This week Home Depot became the latest in the growing list of major organizations that are the apparent targets of cybercriminals. Indeed, cybercrime seems rampart and cyberdefense... More

Weekend Vulnerability and Patch Report, Sept. 7, 2014 (Citadel Information Group)

Important Security Updates Dropbox: Dropbox has released version 2.10.29 for its file hosting program. Updates are available at Dropbox’s website. Google Chrome: Google has rel... More

FBI Investigates ‘Cloud’ Celebrity Picture Leaks (BBC)

Images of the celebrities were leaked on image posting website 4Chan. The user posting them - who defined him or herself as a "collector" rather than "hacker" - said more images o... More

Wanted By DHS: Breakout Ideas On Domestic Cybersecurity (Information Week)

Companies, universities, and other entities that have existing but unfunded, innovative cyber security projects should take advantage of new funding from the Homeland Security Depa... More

Cybersecurity Stocks Pop. Thank the Hackers (CNN Money)

As hackers try to steal credit card data from Home Depot (HD) and naked pictures from Hollywood celebrities, cybersecurity companies are seeing big gains. Shares of both Palo Alto... More

Backoff Sinkhole Reveals Point-of-Sale Security (Threat Post)

Kaspersky Lab researchers say that a recent analysis of two Backoff malware command and control servers paints “a very bleak picture of the state of point-of-sale security.” K... More

People, Process, Technology: How Good Information Security Can Grow Your Business (Info Security)

Business depends on sharing information: internally between teams and externally with customers and suppliers. Yet they face a paradox. In order to be successful, firms need to sha... More

From IT Security to Information Security — How Technology Is Not The Greatest Challenge in Protecting Your Information Online (CSO)

Michael Rothery, First Assistance Secretary for National Security Resilience Policy at Department of the Attorney General says that in order to deliver effective security and risk ... More

A Google Site Meant to Protect You Is Helping Hackers Attack You (Wired)

Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs. Hackers and cybercrooks do the ... More

Notes on the Celebrity Data Theft (New Web Order)

An interesting aspect of information security is how periodically it collides with other industries and subcultures. With more information than ever being stored and shared online ... More

It Does Matter That The White House Cybersecurity Czar Lacks Technical Chops (Forbes)

Michael Daniel, the White House cybersecurity coordinator or “cyber czar”, made comments recently that being a coder or “being too down in the weeds at the technical level co... More

Weekend Vulnerability and Patch Report, Aug. 31, 2014 (Citadel Information Group)

Important Security Updates AVG Free Edition: AVG has released version 2014.0.4765 of its 32 bit Free Edition. Updates are available on AVG’s website. Evernote: Evernote has rel... More

Gartner: Worldwide Information Security Spending at All-Time High (CDSA)

By Chris Tribbey Considering all the recent, high-profile cyber security breaches, it’s a scary time for governments, businesses and consumers. But these constant security threa... More

Technology Can Make Lawful Surveillance Both Open and Effective (MIT Technology Review)

Democracy rests on the principle that legal processes must be open and public. Laws are created through open deliberation by elected bodies; they are open for anyone to read or cha... More

How to Save the Net: A CDC for Cybercrime (Wired)

The Internet may be made up of software and hardware, but it is an ecosystem that depends on a key human value: trust. The networks and systems must be able to trust the informatio... More

BlackHat 2014: Businesses Look to NIST Risk Management Framework in Bid to Improve Security Posture (Info Security)

The recently released Risk Management Framework from the National Institute for Standards and Technology outlines what organizations need to do to improve their information securit... More

U.S. Warns ‘Significant Number’ of Major Businesses Hit by Backoff Malware (PC World)

Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called “Backoff” and are pr... More

The Internet’s Original Sin (The Atlantic)

The fiasco I want to talk about is the World Wide Web, specifically, the advertising-supported, “free as in beer” constellation of social networks, services, and content that r... More