DDoS attacks on banks have returned, and the attackers are changing their tactics and expanding their attack toolsets. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Homeland Security Secretary Janet Napolitano and NIST Director Patrick Gallagher tell Congress that industry, not the government, will take the lead in establishing IT security best practices for infrastructure operators.
Organizations in 2013 will continue to explore new authentication solutions to improve user access to sensitive information. What are the specific solutions employed by this panel of security leaders?
More than merely a phishing incident, a targeted attack is part of an advanced persistent threat. How can organizations defend against these attacks? Kevin Epstein of Proofpoint offers insight.
Companies wanting to share cyber-threat information with the government and other businesses should adopt the U.S. Defense Department's doctrine of information superiority, says Lares Institute Chief Executive Andrew Serwin.
Is your status among C-level colleagues slipping? Are your budgetary pitches falling flat?
If you've answered "yes" to either of these questions, Forrester Research, Inc.'s February 2012 report, Navigate the Future of the Security Organization can help you:
Stop reacting to a never-ending series of threats du...
For the first time, Ponemon Institute has quantified the staggering costs of failures in cryptographic key and digital certificate management.
The First Annual Cost of Failed Trust Report, underwritten by Venafi, reveals findings such as:
Hundreds of millions lost due to failure to control trust;
Serious...
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
DDoS attacks on U.S. banks and credit unions have resumed, just as industry experts predicted. Security specialist Bill Stewart says this wave is yet another sign that institutions must bolster defenses.
Mobile malware, jailbroken devices and unpatched systems are three of the top security threats to mobile workers. How can organizations mitigate the risks? Dave Jevans of Marble Security offers tips.
The private sector has a unique opportunity to respond to President Obama's cybersecurity executive order and help shape information sharing and critical infrastructure protection. David Burg of PwC tells how.
Will Pelgrin and Rich Licht of the Center for Internet Security see a strong link between cyber and physical security, and that has led to the creation of a new unit at the center to help local and state governments to secure both.
New research says more than 25 percent of consumers hit by a data breach later become victims of identity fraud - especially when payment card information is exposed. Javelin's Al Pascual shares analysis.
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.