Page 2 - index
P. 2







CONTENTS CYBER WARNINGS

Published monthly by Cyber Defense Magazine and
distributed electronically via opt-in Email, HTML, PDF and
Eye opening innovations from RSA Conference 2015 .................................................. 3
Online Flipbook formats.
RSA Conference Unveils Unique Challenges and Trends as Cyber Attacks Mature .... 5
PRESIDENT
XpoLog – Turning Data into Action ............................................................................... 7
Stevin Victor
Threat Intelligence & RSA ........................................................................................... 10 [email protected]

EDITOR
Hackers Using Macro-Based Malware to Breach Business Networks ........................ 12

Has Your IT Been Left in the Dark? ............................................................................ 15 Pierluigi Paganini, CEH
[email protected]
41 New England Firms Make the Cybersecurity 500 .................................................. 18
ADVERTISING
Three IT Workplace Issues Preventing CIOs from Sleeping Easy .............................. 23

Jessica Quinn
How eCommerce Uses Cyber Defense ...................................................................... 25
[email protected]
Why Cybersecurity is for CFOs too ............................................................................. 28
KEY WRITERS AND CONTRIBUTORS
The issue of cyber tracking in a modern consumer’s society ...................................... 30
Jim Anderson
Don’t Let Human Nature Undermine Security: Brute-Force and Exploit Attacks ......... 33 Haim Koschitzky
Nahim Fazal
If a college student can do it… .................................................................................... 39 Todd Weller
Bill Mann
“Man Over Machine” ................................................................................................... 45 Steve Morgan
Ric Jones
Nick Rojas
Social Engineering Tactics: Reporting from the Front Line of Breach Defense .......... 48 Milica Djekic
Luis Betancourt
Preparing for Opportunistic and Targeted Attacks Requires Sound Leadership ......... 50 Brian Beyer
Michael Buratowski
Protecting Against New Security Weaknesses in Facebook ....................................... 54 Mike Sconzo
Scott Aken
Joe Ferrara
Mobile Call Interception Threatens Law Enforcement ................................................ 56 Mark Bevilacqua
Jeff Hussey
Risky Business: Phishing and Smishing ..................................................................... 58 Kyle F. Kennedy

How to move beyond the SIEM .................................................................................. 60 Interested in writing for us:
[email protected]
More of the Same Won’t Keep Us Safe ...................................................................... 64

Five Username Mistakes That Can Be Worse Than Using the Same Password for All CONTACT US:
Your Online Accounts ................................................................................................. 67
Cyber Defense Magazine
Why CISO’s evolving into CBSO’s should be a priority for an enterprise?.................. 69
Toll Free: +1-800-518-5248
RSA Conference 2015 Trip Report ............................................................................. 74 Fax: +1-702-703-5505
SKYPE: cyber.defense
Magazine: http://www.cyberdefensemagazine.com
NSA Spying Concerns? Learn Counterveillance ........................................................ 80
Copyright (C) 2015, Cyber Defense Magazine, a division of
Top Twenty INFOSEC Open Sources ........................................................................ 83 STEVEN G. SAMUELS LLC
848 N. Rainbow Blvd. #4496, Las Vegas, NV 89107. EIN: 454-18-
National Information Security Group Offers FREE Techtips ....................................... 84 8465, DUNS# 078358935.
All rights reserved worldwide. [email protected]
Job Opportunities ........................................................................................................ 85 Executive Producer:
Gary S. Miliefsky, CISSP®
Free Monthly Cyber Warnings Via Email .................................................................... 85

Cyber Warnings Newsflash for May 2015 ................................................................... 88





2 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7