More hackers are attacking payment processors and merchants with enhanced malware to compromise credit and debit card data. What steps can be taken to thwart the threat?
Mobility and privacy: Increasingly, organizations are forced to take actions on these topics. What are the latest legal and regulatory trends? Attorneys David Navetta and Ronald Raether share insights.
As distributed-denial-of-service attacks on banks continue, a U.S. electric utility also reportedly is a DDoS victim. Is this a sign that hacktivists are broadening their targets? Experts offer analysis.
The rhetoric from White House officials and President Obama himself finally provide proof to the long-time claim that cybersecurity is a top administration priority.
A new report claims the Department of Veterans Affairs transmits unencrypted data, including patient records, across unsecured networks. But the VA offers a different assessment.
Phishers now shield malicious code behind the guise of legitimate digital certificates. How can organizations ensure they don't fall victim to these attacks? Jerome Segura of Malwarebytes offers tips.
The Obama administration is calling on the Chinese government to take serious steps to halt cyber-intrusions emanating from China that have resulted in the theft of intellectual property from American companies.
DDoS attacks on banks have returned, and the attackers are changing their tactics. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.
DDoS attacks on banks have returned, and the attackers are changing their tactics and expanding their attack toolsets. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Internet visionary Vint Cerf sees the development of strong authentication for the billions of devices connected to the Internet as the IT security community's next big challenge.
Homeland Security Secretary Janet Napolitano and NIST Director Patrick Gallagher tell Congress that industry, not the government, will take the lead in establishing IT security best practices for infrastructure operators.
Seeing eye to eye on every facet of a venture isn't required to be business partners; agreeing on long-term goals of the collaboration is a must. Just ask Tom Ridge and Howard Schmidt.
Organizations in 2013 will continue to explore new authentication solutions to improve user access to sensitive information. What are the specific solutions employed by this panel of security leaders?
More than merely a phishing incident, a targeted attack is part of an advanced persistent threat. How can organizations defend against these attacks? Kevin Epstein of Proofpoint offers insight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.