The Latest News

  • 'Swarming' Talent on InfoSec Challenges

    MS-ISAC Leader Jane Holl Lute on Cybersecurity Cooperation 'Swarming' Talent on InfoSec Challenges
    Jane Holl Lute (Source: Center for Internet Security)

    The new chief executive of the Center for Internet Security, which operates the Multistate Information Sharing and Analysis Center, sees mutual cooperation among enterprises as a way for organizations with limited staff to address critical IT security problems. Read more...

  • Preventing Another OPM-Type Breach

    Former CIA CISO on Practical Defensive Measures Preventing Another OPM-Type Breach
    Robert Bigman

    Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks. Read more...

  • OPM Suspends Background Check System

    Union Slams Agency with Class-Action Data Breach Lawsuit OPM Suspends Background Check System

    Following its mega-breach, the U.S. Office of Personnel Management suspends use of its online background check application system, citing a vulnerability. Also, the agency now faces a breach-related lawsuit filed on behalf of federal workers. Read more...

  • Analysis: Why the OPM Breach Is So Bad

    Personal Secrets at Risk After Background Forms Exposed Analysis: Why the OPM Breach Is So Bad
    Ann Barron-DiCamillo of US-CERT testified on the OPM breach.

    Just how bad is the U.S. Office of Personnel Management breach? Consider that spies may now have access to every secret - sexual, financial, familial, medical - shared by personnel seeking security clearances to access classified U.S. information. Read more...

  • OPM Breach: China Is 'Leading Suspect'

    But Intel Chief Urges Policymakers to Improve Defenses OPM Breach: China Is 'Leading Suspect'
    U.S. Director of National Intelligence James Clapper

    China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution. Read more...

  • Blog

    Can Selfies Fight Payment Card Fraud?

    MasterCard Tests Facial Recognition App By Mathew Schwartz
    Can Selfies Fight Payment Card Fraud?

    MasterCard is testing a smartphone app that lets users approve online transactions using facial recognition, via the equivalent of taking a selfie. But could such technology be spoofed, and will it reduce card fraud?

  • Article

    Cardinals Sack Employee After Hack

    FBI Still Investigating Houston Astros Database Breach By Mathew J. Schwartz
    Cardinals Sack Employee After Hack

    The St. Louis Cardinals baseball team has fired its scouting director amidst allegations that the team hacked into a database run by its rival Houston Astros team. A related investigation is ongoing.

  • Article

    Phishers Felled Bitcoin Exchange

    $5 Million Bitstamp Breach Detailed in Unconfirmed Report By Mathew J. Schwartz
    Phishers Felled Bitcoin Exchange

    An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.

  • Article

    Trump Hotels Investigates Hack Report

    Suspected Card Fraud Traced to Multiple Hotel Locations By Mathew J. Schwartz
    Trump Hotels Investigates Hack Report

    Trump Hotel Properties confirms it is investigating reports of card fraud tied to multiple hotels. Numerous hotels, restaurants and retailers continue to report breaches, stemming from POS malware infections.

  • Article

    Europol Details Online Jihadist Hunt

    Extremist Propaganda Targeted By EU Internet Referral Unit By Mathew J. Schwartz
    Europol Details Online Jihadist Hunt

    Europol has launched a new EU Internet Referral Unit to combat online terrorist propaganda, disrupt extremist recruitment and coordinate related intelligence-gathering and law enforcement response.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Application Security: Four Key Steps

Last year, a number of application vulnerabilities led to compromises of many organizations'...

Latest Tweets and Mentions

ARTICLE Application Security: Four Key Steps

Last year, a number of application vulnerabilities led to compromises of many organizations'...

The ISMG Network