Getting critical infrastructure operators involved is the biggest challenge the federal government faces in creating a cybersecurity framework, says NIST's Adam Sedgewick, who leads efforts to create the framework ordered by President Obama.
Despite what's now been a two-month break from hacktivists' DDoS attacks on banks, we can expect more assaults from Izz ad-Din al-Qassam Cyber Fighters. And this next wave should concern us all. Here's why.
The concept of hack-back as an approach to mitigate the theft of intellectual property has gained momentum, yet privacy attorney Ronald Raether sees several problems with the practice.
The OCC has for the first time named cyberthreats as a major factor heightening banks' operational risks. And banking security experts say this is a sign that greater regulatory scrutiny will come.
Cybercriminals are developing an increasingly sophisticated black market of tools and services to target organizations, says James Lyne, who details the evolution of advanced cyber-attacks.
Aimed to be voluntarily adopted by the nation's critical infrastructure operators, the cybersecurity framework will revolve around a core structure that includes five major cybersecurity functions: Know, Prevent, Detect, Respond and Recover.
Spear-phishing attacks are up and targeting individuals across all industries, according to a new warning from the FBI. Security experts advise how organizations can better detect and prevent attacks.
The European parliament recently voted to extend and strengthen ENISA. With this, the agency is expected to play a key role in top cybersecurity initiatives across the EU, says the agency's Steve Purser.
Cyber-attacks are taking aim at governments, banks and organizations across numerous sectors, says former FBI investigator Shawn Henry. But how much do we know about the actors waging these attacks and who their top targets are?
Significant security flaws involving access, configuration-management and continuous-monitoring controls have been identified in a new Inspector General audit of Veterans Affairs' IT systems.
Cash-out schemes will continue to impact organizations. What lessons can be learned from recent incidents, and what questions must be answered? Former federal prosecutor Kim Peretti shares insight.
More than one-quarter of the U.S. Senate is asking the national intelligence director to reveal more information to the public regarding the government's programs to collect massive amounts of data on communications of ordinary Americans.
Patent infringement lawsuits that involve security practices are becoming more common in heavily-regulated industries. Organizations need to take several steps to be well-prepared, advises patent attorney James Denaro.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Americans are not overly concerned about their own cybersecurity - according to Unisys' latest security index - yet CISOs cannot become overly complacent, says the company's Steve Vinsik.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.