Tags » Security Breaches

What is a secure communication network?

“It is a fine thing to be honest, but it is also very important to be right.” Winston Churchill
(Guruge, 2003)

Secure communication network (Pixabay, 2016) 367 more words

General

Hillary’s First National Security Briefing

It’s official.

Hillary Clinton now has just about everything Vladimir Putin and Julian Assange know.

Denver Post

WHITE PLAINS, N.Y. — Hillary Clinton received her first national security briefing Saturday as the Democratic presidential nominee, meeting with intelligence officials for an overview of the major threats facing the nation around the globe. 395 more words

Hillary Clinton

65% of Breaches Caused by a Third Party - How Well Do You Know Yours?

Hardly a day goes buy without a new headline about a high profile breach.  Pick up a local newspaper, or the NY Times or simply spend a few minutes on your LinkedIn thread and you’ll find news about Target, Home Depot and Wendys to name a few.   362 more words

Vulnerability Assessments

Want to Know Why Majority of Americans Hate Hillary? Watch this Clip

The FBI director James Comey scrapped so many of the talking points that Hillary Clinton has used over and over again throughout her email scandal, including that she never emailed classified material; that information in the emails was classified retroactively; that none of the emails were marked as containing classified information; that there were definitively no security breaches; that she turned over all work-related emails to the State Department; that the set-up was driven by convenience; and that the government was merely conducting “a security review.” 79 more words

SS8 Launches BreachDetect, An Analytics Platform For Detecting Security Breaches

On June 1, SS8 elaborated details of BreachDetect, a product that specializes in the retrospective detection of security breaches. Using analytics that facilitate the detection of security breaches and their associated devices of interest, BreachDetect has the capability to identify network-based breaches that may have escaped identification from other security tools and applications. 384 more words

Miscellaneous

Stop Posting Photos of Real Keys in News Stories

We’ve all seen that moment on TV where someone surreptitiously gets hold of another character’s keys, presses one into a bit of putty, puts the keys back where they belong and heads off to make a copy. 994 more words

New York Post