To shine a light on cybercrime, go Dark
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
Taylor Armerding | 11 Aug | Read more
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
Taylor Armerding | 11 Aug | Read more
Credit card data isn't quite the mother lode it once was for cyber thieves. Not only is its useful life generally brief, it also isn't worth as much as it used to be.
Taylor Armerding | 01 Aug | Read more
Reading the headlines relating to cyber-security you would not be blamed for thinking we are in a losing battle against relentless foes. The breaches at OPM, Ashley Madison, Target, Sony, and many others highlight criminals are consistently looking for ways to breach our defences. It is understandable then why many CISOs may look nervously at their networks wondering if they will be the next victim, or worse, are they already a victim without knowing it.
Brian Honan | 27 Jul | Read more
Life is tough if you're a criminal.
Maria Korolov | 22 Jul | Read more
The year of cybercrime since our most recent US State of Cybercrime Survey has been nothing less than stunning. There were the Home Depot and JP Morgan Chase data breaches, the Sony Pictures fiasco, and most recently the devastating breach at the US Office of Personnel Management (OPM) that appears to be worse than
George V. Hulme | 09 Jul | Read more
It is a given that if there is money to be made from illegal activity, organized crime will be a player. So it is no surprise that multiple versions of the mob are active in cybercrime.
Taylor Armerding | 24 Jun | Read more
The French TV station TV5Monde suffered a major cyber-attack on the evening of the 8th of April resulting in all of its eleven channels being taken off air for three hours. At 10:00 p.m. Paris time the eleven channels for TV5Monde, which reach over 260 million people worldwide, went blank. At the same time the station's Facebook page was hijacked and its website defaced.
Brian Honan | 10 Apr | Read more
Some information spies navigate the hiring process with every intention to steal corporate secrets for a competitor or foreign state once inside. Others turn against an employer when angered and leave, lured by job offers and incentives to haul out as much data as they can when they go.
David Geer | 04 Feb | Read more
Does the size of your enterprise really matter to cybercriminals? Well, yes and no.
Taylor Armerding | 13 Jan | Read more
Everybody has heard of business owners forced to pay "rent" to mobsters to ensure that their building doesn't "accidentally" burn to the ground or suffer some other deliberate misfortune.
Taylor Armerding | 06 Jan | Read more
There is still time for any list of the "top information security issues of 2014" to be rendered obsolete. The holiday shopping season is just getting into high gear, after all, and everybody knows it was from late November to mid-December last year when the catastrophic Target breach occurred.
Taylor Armerding | 18 Nov | Read more
Nations increasingly touched by cyberattacks are still in the very early stages of figuring out how to deal with incidents that could escalate into critical national security threats.
Jeremy Kirk | 18 Jun | Read more