Lawmakers and their staffs are working behind the scenes to get one or perhaps two pieces of cybersecurity legislation enacted before the 113th Congress adjourns this month. But passage remains a longshot.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
Security practitioners must change their mindset, says Dave Merkel of FireEye. We have to stop thinking we're preserving peace and realize that we're responding to warfare from well-armed attackers, he contends in this video interview.
Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.
At a time of growing anxiety over cybercrime, especially among businesses victimized by cyber-attacks, the Justice Department is creating a cybersecurity unit aimed, in part, to better engage the private sector to battle online crime.
A remote-access attack that compromised a parking facility provider with locations in Illinois, Pennsylvania, Ohio and Washington highlights how commonly used point-of-sale terminal and software brands are increasingly being exploited by hackers.
The destructive code that was used to infect and erase hard drives at Sony Pictures Entertainment - and which apparently was the subject of a recent FBI "flash alert" - has been identified as "wiper" malware known both as Destover and Wipall.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks
and advanced threats can easily evade these controls.
Read the Q&A transcript featuring Damballa CTO Brian Foster. Discussion topics...
Ashton Carter, who's been nominated by President Obama to serve as secretary of defense, is a Ph.D. physicist who understands that cyberdefense must be a priority in running the Pentagon.
For the first time since 2010, the FFIEC has released updated guidance about Bank Secrecy Act compliance requirements and money-laundering risks. As a result, a fraud expert says banks should brace for more regulatory scrutiny in early 2015.
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Although it has been around for years, it has recently come back into the spotlight with Gartner's
research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of...
In the wake of the FBI issuing a warning that a U.S. business, reportedly Sony Pictures Entertainment, has been attacked using a dangerous form of "wiper" malware, security experts weigh in on the news and offer mitigation advice.
A new report from FireEye about the emergence of cyber-attacks aimed at the accounts of executives at publicly traded corporations for the purpose of "obtaining an edge" in stock trades has raised some questions among financial fraud experts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.