In his eight years in the White House, former President Barack Obama made cybersecurity a priority. But will his legacy be his administration's various IT security initiatives or the damaging breaches that occurred during his tenure? That's the lead story in the latest edition of the ISMG Security Report.
Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data exfiltration.
The malicious use of encryption is growing at an alarming rate, from 104 in 2014, to 13,542 as of mid-2016, according to...
Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network performance burdens for organizations that wish to inspect encrypted traffic.
The first in a series on encryption, this technical brief...
Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such as security effectiveness, deployment options, performance and administrative capabilities.
Since cybercriminals prize new threats...
The KillDisk disk-wiping malware, previously tied to espionage operations, has been updated with crypto-locking capabilities and now targets Linux as well as Windows systems. But security experts warn that attackers using the Linux variant have no way to furnish a decryption key.
A task force led by two lawmakers and a former U.S. CIO recommends the new administration should jettison outdated ways the federal government tackles cybersecurity, saying in a just-issued report: "Once-powerful ideas have been transformed into clichés."
An analysis of a National Institute of Standards and Technology initiative to identify algorithms that could defend encryption against attacks from quantum computers leads the latest edition of the ISMG Security Report. Also featured: An update on new FDA guidance on cybersecurity for medical devices.
This edition of the ISMG Security Report features an analysis of recommendations by a U.S. House Encryption Working Group that Congress should not enact legislation that requires technology companies to help law enforcement authorities bypass encryption on the devices they manufacture.
Three Romanian men accused of running a cybercrime ring that used custom-built "Bayrob" malware and money mules to steal at least $4 million from victims have been extradited to face charges in the United States.
The mobile workforce has arrived, and employees everywhere are leveraging the convenience of their smartphones and tablets. But while workers enjoy the freedom of being slightly less tethered to their desks, IT minds the security risks.
Mobile device management (MDM) lets IT be the voice of reason while granting...
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.
The ransomware-as-a-service operation known as Cerber is earning at least $200,000 per month via ransoms paid by victims, says Check Point Software Technologies' Gadi Naveh. In an audio interview, he explains that bitcoins and high levels of automation are key to the operation's success.
Russian hackers may think twice before traveling outside the country for a vacation in light of the arrest of alleged 2012 LinkedIn hacker "Yevgeniy N." by Czech police at a restaurant in Prague earlier this month.
This case study delves into how El Paso Area Teachers Federal Credit Union was able to use strong authentication to simultaneously:
Secure access to all applications
Eliminate the cost and frustration of password resets
Improve employee productivity and satisfaction