Study: Firms not ready to respond to complex threats
Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA.
Maria Korolov | 24 Apr | Read more
Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA.
Maria Korolov | 24 Apr | Read more
A gang of criminals based on the West Coast is robbing banks in the East, using text messages and voice recordings to target small, local banks and credit unions.
Maria Korolov | 22 Apr | Read more
Attacks against industrial control systems doubled last year, according to a new report from Dell.
Maria Korolov | 18 Apr | Read more
According to the Verizon data breach investigations report released today, the average cost per breached data record is $US0.58 cents.
Maria Korolov | 15 Apr | Read more
While the volume of cyberthreats declined slightly last year, their sophistication increased, according to a new report from Websense Security Labs.
Maria Korolov | 09 Apr | Read more
Cyberattacks on one organization can have ripple effects that reach far beyond it, according to a new survey of C-level executives by Sunnyvale, Calif.-based security vendor RedSeal, Inc.
Maria Korolov | 08 Apr | Read more
Chinese adversaries were the most active state-sponsored cyberthreat groups last year, according to report released by CrowdStrike, but it was Vietnam, not the US, that was its top target.
Maria Korolov | 12 Feb | Read more
Earlier Friday the Investigatory Powers Tribunal (IPT) in the UK ruled that the UK's Government Communications Headquarters' (GCHQ) access to information intercepted online by the US National Security Agency (NSA) was unlawful up until December 2014. The Investigatory Powers Tribunal was established in October 2000 under the Regulation of Investigatory Powers Act 2000 ('RIPA') to enable UK citizens to reveal cases where they believed their human rights have been violated by illegal UK government surveillance. On foot of allegations by former NSA contractor Edward Snowden that GCHQ had agreements in place with the NSA which enabled GCHQ to have access to the data gathered and held by the NSA on UK citizens, a number of civil liberties groups such as Privacy International and Liberty brought a case to the IPT.
Brian Honan | 07 Feb | Read more
In his State of the Union address Tuesday night, President Barack Obama promised to protect a free and open Internet and urged Congress to pass cybersecurity legislation, but the lack of concrete movement forward was a disappointment for many security experts.
Maria Korolov | 23 Jan | Read more
In an attempt to get ahead of cybercriminals, 16 banks have donated between $50,000 and $500,000 each to a build a new platform for sharing threat information. That platform is going live today -- and it's not just for banks.
Maria Korolov | 05 Dec | Read more
It's what all sensible people do to mitigate the risk of catastrophic financial damage: Buy insurance. There's not even a choice when it comes to auto and health risks – insurance is a legal mandate. And most people would agree that anyone with a house who does not carry homeowner's insurance is a fool or fabulously wealthy.
Taylor Armerding | 21 Oct | Read more
Towards the end of July, ESD America, the makers of the ultra-secure CryptoPhone, said that their engineers and customers had discovered more than a dozen rogue cell towers (also known as interceptors or IMSI catchers) around the U.S.
Steve Ragan | 18 Sep | Read more
A Chinese cyberespionage group operating out of Shanghai has been launching targeted attacks against the U.S. defense and European aerospace industries, a security vendor reported.
Antone Gonsalves | 10 Jun | Read more
The massive data breach that tarnished the career of Target Chief Executive Gregg Steinhafel and contributed to his resignation is a reminder of the worst-case scenario facing CEOs caught in a security SNAFU.
Antone Gonsalves | 06 May | Read more
An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications.
Antone Gonsalves | 19 Apr | Read more