SecurIT360 Blog

In-depth IT and cybersecurity news and education

Compliance|Research>The Hitlist

The Hitlist: International Travel

International travel is common in today’s business world.  Many times businesses assume that their standard policies can apply to any international destination.  We recently had

Information Security>Data Breach|Uncategorized|Computer & Network Security>Vulnerabilities

Security Incident Case Study – A MSSP Run Amok

This is a case study of a security incident that occurred recently. The purpose of sharing this case study is to provide an example as to

Computer & Network Security|Information Security>Data Breach|Social Engineering

Law Firm Breach Used for Insider Trading Profit

Three Chinese citizens are charged for insider trading after allegedly making $4 million by using information obtained from Law Firms.  The breach has to do

Compliance|Computer & Network Security|Information Security|Research

2015 Cyber Security Awareness Month

What is Cybersecurity? According to US-CERT, “The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein

Computer & Network Security>Adobe|Compliance|Computer & Network Security>Java|Computer & Network Security>Vulnerabilities

Third Party Apps: Consider The Risks

What are 3rd party tools? Everyone, from individuals to enterprises, uses third party tools and applications on their workstations, servers and mobile devices.  Some examples

Computer & Network Security>Apple

iOS Malware – The Sky Is (not) Falling!

By now you should have heard that malware has been detected in apps available from Apple’s App Store.  (Let’s take a short break to let