Cyber-historian Jason Healey contends the U.S. government does not want peace in cyberspace so it can conduct more attacks and exploitations. Instead, he says the feds should make the Internet's economic benefits its top priority.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Organizations are careful when granting privileged access to critical systems. But they struggle to govern these privileged identities. Merritt Maxim of CA Technologies shares new strategies.
Solutionary is out with its quarterly threat intelligence report. Topping the list: the exploitability of the Heartbleed bug, and the current malware trends. Rob Kraus teases the report's highlights.
No single security solution is enough to defend against today's multifaceted exploits. So it's time for a new holistic and cooperative approach to information security, says Bob Hansmann of Websense.
Former NSA information assurance leader Tony Sager goes on the road to the Black Hat USA security conference to promote the notion that no one should try to solve cybersecurity threats alone.
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
IT security expert Bruce Schneier, now the chief technologist at an incident response provider, sees tools that help enterprises respond to a data breach being used for other unexpected events.
Learn the top techniques for defending against ransomware attacks that encrypt stored data and demand a payoff to unlock PCs, servers, storage devices and smart phones.
Expect every new warning of cybercrime attacks, online espionage or the malware du jour to be slickly marketed, with the announcements carefully timed. But is this bad for either the information security community or attackers' victims?
A report that Russian hackers have hoarded 1.2 billion stolen passwords could prove to be an important catalyst for beefing up information security. Experts analyze the potential impact.
That Russian hackers may be hording 1.2 billion credentials merely reflects the insecurity of the world we live in today, says David Perry, threat strategist at the Finnish IT security company F-Secure.
To honor our loyal readers, and to invite even more of their comments, we're debuting a new, weekly infographic entitled ISMG Buzz, in which we offer a "best of" compilation of the latest insights.
The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.