Following two years of headline breaches at the likes of Target, JPMorgan Chase, Sony, Anthem and OPM, many industries are increasing regulations on cybersecurity. One of the more important requirements is detecting anomalous behavior within your company's network. So how can your security team distinguish between...
Cyber Jedis know that Star Wars provides a wealth of incidents worthy of study. In fact, the entire story of Episode IV: A New Hope centers around the response to and consequences of a data breach, culminating in the destruction of the Death Star. If the Empire had been able to make sense of the intelligence they...
Healthcare is the new battleground, and the personal patient data that hospitals have readily available is more lucrative, more
comprehensive, and more attractive than retail and banking data ever was. Violations of patient privacy leave healthcare organizations vulnerable. Unfortunately, it's not a question of if...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
Can your security team detect and identify intruders before data disappears? Are you confident that former employees and contractors no longer have access to your critical systems? These are among the questions we set out to answer in the 2015 Privileged Access
Management Study, sponsored by Hitachi ID Systems, and...
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
The FBI is pursuing a suspected Russian hacker who reportedly amassed a trove of 1.2 billion stolen online credentials, plus payment card data and Social Security numbers, and who's offered access to hacked Facebook and Twitter accounts.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
To stop threats, you first have to see them coming.
Today's cyber threats are increasing in volume, diversity and sophistication, rapidly outstripping the ability of point security solutions to safeguard critical data, applications and systems. Network-based security replaces these vulnerable point solutions with...
BitSight Technologies is out with its annual Industry Benchmark Report, and cybersecurity ratings are low for the energy and utilities industry. BitSight's Mike Woodward shares insights for all sectors.
Email fraud is rife and costs companies like yours millions every year.
Implementing the authentication standard DMARC (Domain-based Authentication Reporting and Conformance) to block bad email before it reaches consumer inboxes is a great first step. But DMARC isn't enough. Real-time email threat intelligence...
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.
Thou shalt not reverse engineer Oracle's products. That was the stunning diktat issued by Oracle CSO Mary Ann Davidson in a blog post that some are reading as a declaration of war against the security research community.
The Black Hat conference features presentations that have already led to very public warnings about remotely hackable flaws in everything from Jeep Cherokees and Linux-powered rifles to Android mobile devices and Mac OS X.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.