How can you deal with ShellShock?
The vulnerability, known as “ShellShock,” takes advantage of a bug discovered within the GNU Bourne-Again Shell (BASH) which allows malicious users to remotely execute commands, regardless of restrictions placed on the environment.
Internet Explorer Zero-Day Vulnerability (CVE-2014-1776)
A newly discovered vulnerability in the Microsoft Internet Explorer browser versions 6 to 11 was publicly disclosed by Microsoft on April 26th, 2014. This vulnerability is a ‘zero-day’ vulnerability which is a vulnerability that was previously unknown and is being actively exploited now.
PwC Cyber Intelligence Briefing: Demystifying 'Heartbleed'
Learn more about the 'Heartbleed' breach and what you can do to protect yourself.
In brief / Cyber resilience: Protecting what matters most
What can you do to protect your organization while responding to emerging threats? By envisioning a practical security strategy and enabling technology to transform your business, you’ll be able to protect what’s important.
View a collection of our cyber resilience publications.
Cyber security crisis management: A bold approach to a shadowy nemesis
As cyber crime runs rampant, major cyber incidents and data breaches that would have been unimaginable just a few years ago, are wreaking havoc on organizations of every stripe.
Embedding cyber security into the energy ecosystem: An integrated approach to assessing cyber threats and protecting your assets
Last summer, one of the world’s largest oil and natural gas producers discovered that a virus had infiltrated 30,000 of its computer workstations. Today’s cyber threats are persistent, well organized, constantly evolving— and often successful.
Defending yesterday: Key findings from the Global State of Information Security® Survey 2014
The security strategies of yesterday aren’t working against highly skilled adversaries using techniques and technology of tomorrow.
Our team of cyber resilience experts discuss the latest developments in the cyber resilience area.
Are you compromised, but don’t know it? A new philosophy for cyber security
Read this publication to learn more about how you can better protect your business from cyber threats by applying a new philosophy to cyber security.
Detecting advanced cyber intrusions and cyber-based economic espionage
Download this publication to learn about the consequences of cyber attacks and espionage and what to do in the event that your organization is targeted.
Protecting information assets: Top security considerations for internal audit
Read this publication to learn what you need to know to protect your organization from cyber crime, theft and destruction from an increasingly malicious internet.
Trial by Fire: Key Insights from the 2010 Global Information Security Survey
Nearly 40% of Canadian survey respondents didn’t know if their organizations had experienced a breach in security. This should be a wake up call for all CEOs, CIOs and CISOs.