To honor our loyal readers, and to invite even more of their comments, we're debuting a new, weekly infographic entitled ISMG Buzz, in which we offer a "best of" compilation of the latest insights.
The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
A new report from Trend Micro finds that network vulnerabilities related to backdoor applications and remote access are putting more businesses at risk. What mitigation steps should be taken?
Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats (APTs). These APTs seek to exfiltrate critical data over the long term.
A Russian cyber gang has breached over 420,000 web and FTP sites to pilfer over 1.2 billion credentials, according to Hold Security, saying it discovered "what could be arguably the largest data breach known to date."
U.S. officials have confirmed the existence of a new leaker exposing national security documents, CNN reports. The leak apparently involves documents prepared by the National Counterterrorism Center.
Target Corp.'s net breach expenses not covered by insurance are expected to total $146 million for its most recent three quarters following the company's massive December 2013 data breach that compromised payment card information.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Peruse the agenda for the Black Hat security conference that's being held this week in Las Vegas and you'll get a peek at some of the major cybersecurity challenges ahead - and potential solutions.
What's the main lesson community banks are learning from the FFIEC's cybersecurity pilot exams? That regulators want them to prove they understand emerging threats, says Booz Allen's Jeff Lunglhofer.
A U.S. federal court judge has upheld a warrant requiring Microsoft to give the Justice Department copies of e-mails being stored at a data center in Dublin. But Microsoft plans to appeal the ruling on privacy grounds.
A U.S. appeals court has agreed to hear Wyndham Worldwide's appeal regarding what authority the FTC has over corporate data security. The dispute stems from a suit the FTC brought against the hotel chain following three payment card data breaches.
NIST says its recommended changes to security and privacy assessment procedures should result in significant improvements in the efficiency and cost-effectiveness of control assessments.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.