This is an interesting discussion of the strategic reasons behind Iran’s cyber program including the geopolitical influences.
This is a great write up from Bill Brenner and the team at Akamai concerning the dangers ad pitfalls of DNS hijacking. It is definitely worth a few minutes of your time and is an area each of us should give serious consideration.
Sophos has provided a good overview of the GHOST vulnerability in this article. It is certainly well worth a read.
These are staggering and humbling statistics provided by Brian Krebs and should continue to fuel the conversation around end user awareness.
This is the US-CERT post concerning Apple security updates for several products.
This article from The Hacker News details a critical security vulnerability discovered in the GNU C Library of most Linux distributions. The Vulnerability is known as GHOST.
These are wonderful overview videos by Akamai covering several core IT security functions and compliance requirements.