Darknet cybercriminal reflections: They’re so clever!

I’ve spent a copiousness amount of time on the Darknet this year in a quest to gain more understanding on how cybercriminals think. I’ve been studying their communities, how they operate in the Darknetmarkets, perusing their forums, analyzing their marketing techniques, and contemplating how they justify their criminal activities.It’s been fascinating, and at the same […]

The post Darknet cybercriminal reflections: They’re so clever! appeared first on TekSec.

A breach is found. Now whom do I tell?

In 2014, the ITRC (Identity Theft Resource Center) tracked 783 data security breaches with 85,611,528 confirmed records exposed. This year appears even more dismal. The ITRC Data Breach Reports 3 for July 7, 2015 captured 411 data incidents with 117,678,050 confirmed records at risk. Since data breaches are a common occurrence in today’s information security threat landscape,  it’s going to […]

The post A breach is found. Now whom do I tell? appeared first on TekSec.

Breach response and information sharing

Some breaches require notification such as those involving patient data or customer information, but sharing is optional. Of course, notification is just one form of information sharing. For example, February’s executive order encourages private sector companies to share information on cybersecuritythreats. There are advantages and disadvantages of sharing information with others, and here to talk about […]

The post Breach response and information sharing appeared first on TekSec.

1 2 3 5