This is an interesting discussion of the strategic reasons behind Iran’s cyber program including the geopolitical influences.
This is a great write up from Bill Brenner and the team at Akamai concerning the dangers ad pitfalls of DNS hijacking. It is definitely worth a few minutes of your time and is an area each of us should give serious consideration.
Sophos has provided a good overview of the GHOST vulnerability in this article. It is certainly well worth a read.
These are staggering and humbling statistics provided by Brian Krebs and should continue to fuel the conversation around end user awareness.
This is the US-CERT post concerning Apple security updates for several products.
This article from The Hacker News details a critical security vulnerability discovered in the GNU C Library of most Linux distributions. The Vulnerability is known as GHOST.
These are wonderful overview videos by Akamai covering several core IT security functions and compliance requirements.
This article brings up several important questions. How prepared is your organization for a significant outage? How prepared is your organization to support numerous remote workers during a significant weather event? Can your organization support a completely remote or mobile workforce in the event of an emergency? The Blizzard of 2015 is a great example of an event that can prompt an incident response even without the loss of facilities and data centers.
This is additional sound wisdom from Jeff Man at Tenable. You can never test security too much. I realize that many of us live in worlds with resource constraints, but you should always schedule and dedicate resources to testing and validation.
I must say that I am very intrigued by this conversation. These are two interesting security dynamics.