Without ceremony, President Obama has signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the law that governs federal government IT security.
Many security experts say Sony Pictures Entertainment's decision to cancel the release of the film "The Interview" following a "terror" threat made by hackers against movie theaters and theatergoers sets a dangerous precedent.
Don't take at face value the report that the U.S. government believes that North Korea hacked Sony Pictures Entertainment, numerous information security experts say, warning that hacktivists, insiders or other nations could be the culprits.
Researchers are alarmed about the increasing sophistication of crimeware-as-a-service, an underground business model that pushes adaptable malware from a botnet. How can banking institutions defend their accounts?
Today's customers commonly demand access from any device to any app, anywhere, anytime. But managing high-volume customer identities and supporting digital interactions across web, mobile, and API-based environments raise new identity and access management challenges and magnify any gaps or inefficiencies in security....
Year after year, cyber threats continue to increase in both sophistication and frequency. These threats often lead to high-profile losses, rampant media commentary and end user uneasiness.
Download this eBook to understand:
Why breaches are occurring;
How to protect your organization from hackers with...
The cloud is changing the way businesses approach enterprise software as it provides an option to outsource the infrastructure and underlying maintenance that accompanies deployments. If organizations can fast forward beyond the process of procuring hardware and facilities, installing and configuring software or...
One day after hackers made a "terror" threat against movie theaters planning to show the upcoming film "The Interview," Sony Pictures Entertainment canceled its release.
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge...
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Since the phrase "Advanced Persistent Threat" (APT) was coined nearly ten years ago, it has been the subject of extensive discussion and debate in the IT security community, attracting terabytes-worth of media buzz. The spotlight on APT's has been critical of bringing the reality of today's threats to light, but the...
Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defensive security program be put in place and managed effectively. This will not prevent the well-organized targeted attacks, but will eliminate 99 percent of the background noise and most of the less...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.