Throughout 2014, cyber criminals expanded their potentially devastating attacks into many industries, including several that we had never before seen fall victim to a large number of threats. These threat actors have become increasingly sophisticated, using stealthy new tactics to move laterally and stay undetected...
In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it's not...
If you are an IT manager or administrator, you might have encountered compliance in this or that form. Though the topic is a hit these days, only few IT Pros can explain what compliance really means and what requirements it imposes on the IT processes within an organization. This free white paper is intended to...
Blue Cross and Blue Shield plans' offer of extended ID protection to the more than 106 million individuals covered by their insurance could set new expectations for breach response, some security experts, including Ann Patterson, predict.
At a hearing on the role the Interior Department played in a recent breach at the Office of Personnel Management, the Interior deputy inspector general painted a picture of how a hacker might have breached the agency's computer system.
An international police operation has resulted in charges being filed against dozens of suspected cybercriminals, as well as the shuttering of the infamous hacking forum Darkode. But will the operation take a serious bite out of cybercrime?
Security researchers reported a zero-day bug to Microsoft - which has patched the flaw - after reverse-engineering details were contained in a bug hunter's sales pitch to hacked surveillance software vendor Hacking Team.
What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security?
Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Consider for a moment the most vital operation in your enterprise. It might run financial processing around the world, control a city's electrical distribution, or handle
millions of passengers' airline reservations. What happens to your business if the computers directing such operations are hacked, sabotaged or...
Let's assume that your security operations are stellar. You have procedures in place to keep software patches up to date, and a team that responds to incidents within minutes. A relentless focus on security permeates your enterprise. In short, in-house you're doing everything right. But how about outside your...
Traditional signature-based, preventive controls, such as antivirus, no longer detect or stop targeted malware and other sophisticated endpoint attacks. Other so-called
"next generation" approaches lack deep visibility into endpoint activity and the ability to quickly alert when something seems unusual.
Download...
In 2014, RSA Conference and ISACA agreed to collaborate to examine variables contributing to the current state of cybersecurity. The result of the collaboration is this study, which offers a view into global activity and perceptions pertaining to cybersecurity-related issues. Read this study to learn about issues...
According to the State of Cybersecurity: Implications for 2015 report, cybersecurity now has executive support and increased budgets. Yet there is still a shortage of skilled professionals. This study provides an eye-opening look into cybersecurity at today's organizations and points to key issues that need to be...
Gordon Werkema, who is leading the Federal Reserve's initiative to revamp the U.S. payments infrastructure, describes his security priorities as the move to faster payments progresses.
After the OPM breach, the U.S. and China recently agreed to hammer out a cyber "code of conduct." But John Pescatore, a director at the SANS Institute, argues that governments would be better served by first jointly combating cybercrime.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.