The size of the information security analyst workforce in the United States rose by nearly 20 percent in the past year, according to an Information Security Media Group analysis of U.S. Bureau of Labor Statistics data.
Attributing cybercrime to specific criminals is becoming increasingly critical, says Eward Driehuis of threat intelligence firm Fox-IT. Using the elusive Dridex campaign as an example, Driehuis explains in this video interview how many malware attacks are interconnected.
Apple has removed hundreds of apps from its App Store for violating its user-tracking guidelines. Chinese mobile advertising firm Youmi has issued "sincere apologies" for the tracking behavior and promised to compensate affected developers.
The FBI and Secret Service are investigating reports that CIA Director John Brennan's personal AOL email account was hacked by an American teenager, who found and leaked sensitive information on top U.S. intelligence and national security officials.
A number of short-term and long-term hurdles, including technology and policy issues, stand in the way of achieving secure, interoperable, nationwide health information exchange, says David Kibbe, M.D., of DirectTrust, which maintains a secure email framework.
Adobe has issued an emergency patch for Flash in the wake of security experts warning that cyber-espionage attackers have been exploiting yet another zero-day flaw in the browser plug-in software.
Dow Jones has dismissed a competitor's report, which claims that attackers operating from Russia hacked into the company's servers and stole sensitive financial information for insider-trading purposes.
U.S. merchants that have not yet completed their migration to EMV should brace for upticks in chargebacks from international card issuers, says Gord Jameison, head of Canadian risk services for Visa, in a video interview.
A podiatrist, his wife and the CEO of a healthcare firm have been indicted in a Medicare fraud case that allegedly involved an electronic medical records system deliberately configured to submit falsified medical claims.
Fraudsters break into your network by phishing for access in increasingly sophisticated ways. Anthony Giandomenico of Fortinet describes the importance of tracing every step in the attack lifecycle when devising an effective security strategy.
How do you effectively secure healthcare networks when so many devices access them? Deena Thomchick of Fortinet discusses the unique challenges faced by healthcare leaders required to guard against incursion, both by outside hackers and insiders.
Building a strong platform to secure enterprise email systems is like piecing together a puzzle by joining existing technologies from various sources. NIST is readying a guide to do just that.
ATM fraud losses are increasing globally, and we can expect to see this trend continue as the U.S. ramps up its migration to EMV at the point of sale. Unattended terminals are easy to compromise, and they will always be among fraudsters' favorite targets.
Unprecedented levels of collaboration among targeted financial services firms enabled the international law enforcement operation that disrupted the Dridex botnet, security firm Fox-IT says. Now, can that model be repeated going forward?
In an age of ubiquitous information sharing, it is critical to control how information is presented - and to whom. Lynne Courts of Seclore discusses new security strategies and solutions that address this need.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.