Microsoft is offering a new platform that's designed to help cybersecurity analysts and researchers across various industries share security and threat information. Two experts assess the effort.
Thefts of iPhones in New York, San Francisco and London declined after Apple added a remote-disabling feature. Now Google and Microsoft have promised to offer the feature in their mobile operating systems.
Advanced payments technologies, such as chip cards, tokenization and end-to-end encryption, are effective at stopping card fraud at retailers, but only if they're used as part of a comprehensive threat-mitigation plan, says First Data's Paul Kleinschnitz.
Joining the FBI and New York City police as a member of the newly formed financial cybercrimes task force is the Metropolitan Transportation Authority. A regional transit company battling financial cybercrime? Makes sense when you look at its network.
Organizations are careful when granting privileged access to critical systems. But they struggle to govern these privileged identities. Merritt Maxim of CA Technologies shares new strategies.
Recognizing the security workforce shortage is one thing. Addressing it is quite another. What will it take to truly grow the workforce? Diana Burley of The George Washington University shares her vision.
Two months after the OpenSSL flaw known as Heartbleed was discovered, remediation efforts have slowed. But several security experts laud businesses' rapid response to the threat, noting that they've installed related fixes more quickly than usual.
A bank's $350,000 settlement with a California oil company should serve as a reminder that reasonable security measures offered by banks are increasingly critical to the outcome of account takeover disputes.
A DDoS attack and subsequent data breach that led to the shuttering of source code hosting firm Code Spaces offers an eye-opening reminder to be aware of attacks used as a diversionary tactic to draw attention away from devastating hacking.
If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, an amendment approved by the House of Representatives could help restore it.
A handful of cybersecurity bills could come up for votes next week in Senate committees. But will the entire Senate get to vote on the measures? No major cybersecurity bill has passed the Senate since 2002.
Banking institutions must improve how they analyze cyber-threat intelligence. But without better tools, security leaders can't adequately anticipate new attacks, says Greg Garcia, the new executive director of the FSSCC.
Infrastructure security used to be more manageable. But it's far more complex in today's cloud environment. Carson Sweet of CloudPassage shares insight and strategies to improve cloud infrastructure security.
Leading this week's industry news roundup, FireEye appoints a chief privacy officer to launch a global program, while Blackberry unveils the first product in its eBBM suite.
Several U.S. card issuers confirm that new alerts from Visa suggest the P.F. Chang's China Bistro breach could date back to September 2013, some two months before the attack that compromised Target.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.