Information Sharing & Analysis Center

Type: Keyphrase
Name: Information Sharing & Analysis Center
First reported Aug 21 2014 - Updated Aug 21 2014 - 1 reports

Watson Named VP of Meridian Global Consulting

Thursday, August 21, 2014William H. Watson has been appointed as Vice President of Meridian Global Consulting, LLC, a Mobile, Alabama-based scalable risk mitigation specialist consultancy. Company CEO Jonathan McConnell announced the appointment, stating ... [Published Maritime Professional - Aug 21 2014]
First reported Aug 15 2014 - Updated Aug 15 2014 - 1 reports

3 weeks to register for payments security exercise

Aug. 15, 2014 – Credit unions have three more weeks – until Sept. 5 – to register to participate in the first of two exercises led by the Financial Services Information Sharing and Analysis Center to test payments processes under a feigned cyber atta ... [Published NAFCU - Aug 15 2014]
First reported Aug 14 2014 - Updated Aug 14 2014 - 1 reports

NRF IT Security Council Educates, Advocates To Combat Data Theft

By Trisha Leon , contributing writerData breeches at large chain stores have spurred technology leaders to form the National Retail Federation (NRF) IT Security Council.At the National Retail Federation’s (NRF) BIG Show earlier this year, industry leaders ... [Published Business Solutions - Aug 14 2014]
First reported Aug 12 2014 - Updated Aug 12 2014 - 1 reports

Registration open for payment cyber security exercise

Open registration for the fifth annual simulated cyber security exercise related to payment processes used by banks, community institutions, credit unions and associated financial services organizations was announced by FS-ISAC, the Financial Services ... [Published ABA Banking Online - Aug 12 2014]
First reported Aug 08 2014 - Updated Aug 08 2014 - 1 reports

Aussie banks easy targets for cyber crime

Australia’s banks will be increasingly seen as soft targets for cyber criminals. Ernst & Young’s global head of information security warns.On a flying visit to Australia to meet financial services clients this week, Ken Allan said while banks here suffered ... [Published WA Today - Aug 08 2014]
Entities: Cybercrime, Australia, Fraud
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

600 Retailers Caught Up in Massive Malware Attack

Hundreds of retailers have been the subject of attacks by difficult-to-detect malware , which steals customer information using popular remote-access applications like Microsoft Remote Desktop, Apple Remote Desktop, Splashtop, Join.me and others. The ... [Published Credit.com - Aug 06 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

Preparing for the Next Cyber Attack

Cyber attacks are occurring more frequently, and retailers are certainly a top target.  The ARTS Board (which includes yours truly) recently had a sit-down with Kim Peretti (pictured), Partner, White Collar Crime Group Alston & Bird LLP.  Ms. Peretti ... [Published Oracle - Aug 04 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

Connected vehicle cybersecurity: Opportunity and responsibility

Is the auto industry our next innovation driver?Last week, as leaders of the automobile industry gathered in Detroit to announce a new effort to protect our increasingly networked vehicles from future cyber attacks, President Barack Obama was calling ... [Published The Hill - Aug 04 2014]
First reported Aug 01 2014 - Updated Aug 01 2014 - 1 reports

Staying Prepared for Cyber Attacks

FS-ISAC is running its fifth annual simulated cyber security exercise for financial institutions.Defending against cyber attacks and fraud around payments is a seemingly never-ending battle. Significant attacks, like the Target data breach late last year, ... [Published Bank Systems & Technology - Aug 01 2014]
First reported Jul 31 2014 - Updated Jul 31 2014 - 1 reports

House passes SAFE enhancement, cyber protection acts

WASHINGTON (7/31/14)--The House passed the SAFE Confidentiality and Privilege Enhancement Act (H.R. 4626) and the National Cybersecurity and Critical Infrastructure Protection Act of 2014 (H.R. 3696) this week. The Credit Union National Association supports ... [Published CUNA News Now - Jul 31 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

House clears cybersecurity, SAFE Act measures

Shelley Moore CapitoJuly 30, 2014 – The House on Monday cleared H.R. 3696, legislation to strengthen financial institutions' ability to identify and respond to cyber incidents and threats.Introduced by Rep. Mike McCaul, R-Texas, H.R. 3696, titled “National ... [Published NAFCU - Jul 30 2014]
First reported Jul 29 2014 - Updated Jul 29 2014 - 1 reports

Boost Your Security Posture through Membership in an Industry Information Sharing and Analysis Center (ISAC)

It’s a huge responsibility to try to ensure cyber security for an organization, regardless of its size. Few companies would say they have the full complement of resources they would like to have in order to properly protect themselves from cyber threats. ... [Published Security Bloggers Network - Jul 29 2014]

Quotes

The Goodwill breach is a reminder of why vigilance and planning are so important today. "It's a shame," Rothrock said. "Goodwill was not exactly a Wall Street firm. Goodwill has a lot less to lose than a Wall Street firm financially, but a whole lot to lose from a brand point of view. So I find it an unfortunate state of affairs. But Goodwill is like every other organization: they have to protect this information about their customers, and they didn't."
..."In the cases we've reviewed, poor passwords with remote access were to blame," Hague says. "Many companies use remote access, and if you're not using two-factor authentication, it makes it easier for hackers to brute-force those passwords."
...ndividually-owned and runs independent private networks that are not connected to other franchised center locations," UPS wrote in advistory notice. "The limited malware intrusion was discovered at only 51 The UPS Store franchised center locations and was not present on the computing systems of any other UPS business entities."
By October, DHS plans to have an outreach strategy for publicizing program benefits to critical industry companies. The strategy will highlight "the value of the sensitive and classified federal government data" and authorized ISP services, Ozment said

More Content

All (87) | News (60) | Reports (0) | Blogs (26) | Audio/Video (0) | Fact Sheets (0) | Press Releases (1)
sort by: Date | Relevance
New security bug dubbed Backoff exposed [Published Green Sheet - Aug 25 2014]
WMU Site of Final 2014 Cyber Awareness Luncheon... [Published Michigan.gov - Aug 21 2014]
Watson Named VP of Meridian Global Consulting [Published Maritime Professional - Aug 21 2014]
UPS Reveals Data Breach [Published InfoRiskToday - Aug 21 2014]
Cybercriminals Deliver Point-of-Sale Malware to... [Published Security Week - Aug 21 2014]
From Aspen to Busan — Experts: Health care need... [Published Politico - Aug 20 2014]
Five healthcare information security education ... [Published Health IT Security - Aug 18 2014]
3 weeks to register for payments security exercise [Published NAFCU - Aug 15 2014]
FSSCC taps Fitzgibbons as Chairman [Published Green Sheet - Aug 15 2014]
NRF IT Security Council Educates, Advocates To ... [Published Business Solutions - Aug 14 2014]
Registration open for payment cyber security ex... [Published ABA Banking Online - Aug 12 2014]
BSides Las Vegas 2014 - Anatomy of memory scrap... [Published SecurityTube.Net - Aug 12 2014]
Who Receives Hacker Threat Info From DHS? [Published Nextgov.com - Aug 11 2014]
Aussie banks easy targets for cyber crime [Published WA Today - Aug 08 2014]
How did Russian hackers steal 1.2 billion passw... [Published Columbus Dispatch - Aug 07 2014]
600 Retailers Caught Up in Massive Malware Attack [Published Credit.com - Aug 06 2014]
Cyber Awareness Luncheon Conference Series Come... [Published Michigan.gov - Aug 05 2014]
Preparing for the Next Cyber Attack [Published Oracle - Aug 04 2014]
Connected vehicle cybersecurity: Opportunity an... [Published The Hill - Aug 04 2014]
Backoff Retail Malware Pulls User Info From POS... [Published eWeek - Aug 03 2014]
toolsmith – Threats & Indicators: A Security In... [Published Security Bloggers Network - Aug 02 2014]
NACHA Government Relations Update [Published Noodls - Aug 02 2014]
Homeland Security warns of new Point of Sale at... [Published We Live Security - Aug 01 2014]
Department of Homeland Security warns retailers... [Published TechSpot - Aug 01 2014]
Staying Prepared for Cyber Attacks [Published Bank Systems & Technology - Aug 01 2014]
Emerging POS Attacks Target Small Merchants [Published Bank Info Security - Aug 01 2014]
Nearly 600 U.S. businesses compromised by 'Back... [Published SC Magazine US - Jul 31 2014]
House passes SAFE enhancement, cyber protection... [Published CUNA News Now - Jul 31 2014]
TA14-212A: Backoff Point-of-Sale Malware [Published US-CERT Technical Cyber Security Alerts - Jul 31 2014]
Target's VP of security: Collaboration is key [Published FierceRetail - Jul 30 2014]
1 2 3
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
BSides Las Vegas 2014 - Anatomy of memory scrap... [Published SecurityTube.Net - Aug 12 2014]
Cedit card stealing RAM scraper malware is running amok compromising point-of-sale (POS) systems. Recent breaches have shown that exposure to such attacks is high and there is a lot at risk. This presentation shows how the attack is carried out by looking ...
toolsmith – Threats & Indicators: A Security In... [Published Security Bloggers Network - Aug 02 2014]
br />!--[if gte mso 9]><![endif]-->br />  *borrowed directly from my parent team, thanks Elliot and Scott Prerequisites Microsoft .NET Framework, Version 3.5 or higher for IOCePython 2.7 interpreter for OpenIOC to STIX Introduction I’ve ...
Homeland Security warns of new Point of Sale at... [Published We Live Security - Aug 01 2014]
Malware attacks on Point of Sale (PoS) systems are coming thick and fast right now. Hot on the heels of last week’s article here on We Live Security, a new PoS malware warning was issued this week by Homeland Security’s National Cybersecurity and Communications ...
TA14-212A: Backoff Point-of-Sale Malware [Published US-CERT Technical Cyber Security Alerts - Jul 31 2014]
Original release date: July 31, 2014Systems Affected Point-of-Sale Systems   Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial ...
Boost Your Security Posture through Membership ... [Published Security Bloggers Network - Jul 29 2014]
It’s a huge responsibility to try to ensure cyber security for an organization, regardless of its size. Few companies would say they have the full complement of resources they would like to have in order to properly protect themselves from cyber threats. ...
1 2 3 4 5 6

Press Releases

sort by: Date | Relevance
FS-ISAC Leverages Wapack Labs to Help Protect F... [Published PR Newswire - Dec 10 2013]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.