Security News

There's a Security Gap at the Capitol. And It's as Troublesome as the One at Navy Yard.
2014-06-06 08:10

http://www.nationaljournal.com/congress/there-s-a-security-gap-at-the-capitol-and-it-s-as-troublesome-as-the-one-at-navy-yard-20140605 By Matt Vasilogambros National Journal June 5, 2014

Canadian security professionals unsure about defenses, Ponemon study finds
2014-06-06 08:10

http://www.itbusiness.ca/news/canadian-security-professionals-unsure-about-defenses-ponemon-study-finds/49183 By Candice So itbusiness.ca June 5, 2014

2014 ACM Cloud Computing Security Workshop (CCSW) at CCS
2014-06-06 08:08

Forwarded from: Conference Mailer 2014 ACM Cloud Computing Security Workshop (CCSW) at CCS November 7, 2014, The Scottsdale Plaza Resort, Scottsdale, Arizona, USA....

Monsanto Data Security Breached at Precision Planting
2014-05-30 10:21

http://www.bloomberg.com/news/2014-05-29/monsanto-data-security-breached-at-precision-planting.html By Jack Kaskey bloomberg.com May 29, 2014

Hackers put security tool that finds payment card data into their arsenal
2014-05-30 10:20

http://www.computerworld.com/s/article/9248693/Hackers_put_security_tool_that_finds_payment_card_data_into_their_arsenal By Jeremy Kirk IDG News Service May 30, 2014 Like a crowbar, security...

DUDE, WHERE'S MY CAR? New leccy BMWs have f	limsy password security – researcher
2014-05-28 09:28

http://www.theregister.co.uk/2014/05/27/bmw_password_security_shortcomings/ By John Leyden The Register 27 May 2014

How IT security experts handle healthcare network access
2014-05-28 09:27

http://healthitsecurity.com/2014/05/27/how-it-security-experts-handle-healthcare-network-access/ By Patrick Ouellette Health IT Security May 27, 2014

Mark Twain Casino among 11 casinos reporting security breach
2014-05-20 08:13

http://www.whig.com/story/25558098/mark-twain-casino-among-11-casinos-reporting-security-breach By Edward Husar Herald-Whig Staff Writer May 19, 2014

Want 'perfect' security? Then threat data must be shared
2014-05-14 08:37

http://www.infoworld.com/t/cyber-crime/want-perfect-security-then-threat-data-must-be-shared-242383 By Roger A. Grimes InfoWorld 2014-05-13

How to optimize your security budget
2014-05-13 07:47

http://www.csoonline.com/article/2153713/security-leadership/how-to-optimize-your-security-budget.html By George V. Hulme CSO Online May 12, 2014