Don’t kill Flash, says Cisco security veteran But Flash should not be discarded, believes Cisco security veteran John Stewart, saying it might in fact be the lesser of two evils.…

A Security Awareness and Training Policy Checklist This is a checklist of the policies that should underpin a successful STA program. When building up a team (or virtual team) to…

FCC allows for automated calls and text messages for data breach notifications Although the Telephone Consumer Protection Act (TCPA) requires consumers to provide consent before receiving non-emergency robocalls on their…

Going for Brokerages: FINRA and SEC Risk Alert, ‘‘Cybersecurity Examination Sweep Summary,’’ summarizes the cybersecurity policies and practices of 57 registered broker-dealers and 49 registered investment advisers based on examinations…

FBI Cyber Division Chief Technology Officer Joins K2 Intelligence NEW YORK, June 1, 2015 /PRNewswire/ — Milan Patel has joined K2 Intelligence, an industry-leading investigative, compliance and cyber defense services…

Adversary Intelligence: Getting Behind the Keyboard Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Without Adversary Intelligence, both…