A Cyber Incident Response Plan for Your Web Applications

Barely a day goes by without reports of a data breach or costly outage in yet another organization, and hundreds of similar incidents go unreported. With so many businesses dependent on web technologies, chances are that sooner or later your organizati… Continue reading A Cyber Incident Response Plan for Your Web Applications

Joshua Douglas, Mimecast – PSW #615

During this discussion, Joshua and Paul will speak about the threats facing organizations today and how they are evolving. Josh will also discuss how IT and security teams need to understand the threats their organizations face and how leveraging actio… Continue reading Joshua Douglas, Mimecast – PSW #615

Security Do’s and Don’ts – PSW #615

Paul, Larry, Doug, and Gabe talk about Software Development: Security Do’s and Don’ts.Full Show Notes: https://wiki.securityweekly.com/Episode615 Visit https://www.securityweekly.com/psw for all the latest episodes! To learn more about our … Continue reading Security Do’s and Don’ts – PSW #615

Gabriel Gumbs, Spirion – PSW #615

Gabriel Gumbs is the VP of Product Management at Spirion where his focus is on the strategy and technology propelling Spirion’s rapidly-growing security platform.Full Show Notes: https://wiki.securityweekly.com/Episode615 Visit https://www.securityweek… Continue reading Gabriel Gumbs, Spirion – PSW #615

Julian Zottl, Raytheon – Paul’s Security Weekly #604

Julian Zottl is the Cyber and Information Operations SME at Raytheon. Julian joins us on the show to talk about side-channel attacks! Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts
The post Julian Zottl, Raytheon &#8… Continue reading Julian Zottl, Raytheon – Paul’s Security Weekly #604

How can I check if I am GDPR compliant?

It’s been a year since the EU’s GDPR (General Data Protection Regulation) was introduced. We all remember the flood of emails from businesses asking for confirmation that we wished to remain on their marketing lists and have our details sto… Continue reading How can I check if I am GDPR compliant?

China making ‘rapid progress’ on potency of cyber-operations, Pentagon says

China’s cyber-theft and cyber-espionage operations are accelerating to the point that they can “degrade core U.S. operational and technological advantages,” according to a congressionally mandated assessment of the Chinese military the Pentagon issued Friday. Last year, for example, Chinese intelligence officers were indicted for allegedly conspiring to steal technological information on turbofan engines. China’s efforts to steal sensitive U.S. military-grade equipment more broadly targeted aviation and antisubmarine warfare technologies last year. “The threat and the challenge is persistent. The Chinese remain very aggressive in their use of cyber,” Assistant Secretary of Defense Randall G. Schriver said Friday during a press briefing on the report. China’s efforts to boost its technological prowess go beyond thefts and intrusions, the Pentagon said. Beijing also leverages its intelligence services and Chinese nationals’ access to technologies to try building up its military capabilities while checking adversaries’, the report notes. And although the Pentagon assesses that China believes its capabilities and personnel “lag […]

The post China making ‘rapid progress’ on potency of cyber-operations, Pentagon says appeared first on CyberScoop.

Continue reading China making ‘rapid progress’ on potency of cyber-operations, Pentagon says