The FBI is offering a big-stakes reward for an alleged criminal who ranks at the top of its "cyber most wanted" list. But one cybercrime expert asks: "Would you cross the Russian mafia or some organized crime gang for $3 million?"
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Legislation to end the National Security Agency's bulk collection of telephone records won overwhelming approval in the House of Representatives, but its fate in the Senate remains far from certain.
Ed Felten, the new federal deputy chief technology officer, hasn't been shy about criticizing the federal government, whether it's about the NSA undermining encryption standards or the FBI not being entirely transparent on malware warnings.
President Obama is strongly urging the House and Senate to pass the USA Freedom Act, a bipartisan bill that would ban the National Security Agency's bulk collection of metadata on American citizens' telephone calls.
The chief privacy officer's role has changed considerably, particularly in response to today's cyberthreats. As a result, CPOs at banking institutions need to be collaborators, designers, gatekeepers, teachers and more.
Criminals are exploiting out-of-band authentication methods by using stolen landline numbers to verify their new Apple Pay accounts. How can behavioral analytics help?
Legal experts say the majority of class-action lawsuits filed in response to data breaches fail, and that's unlikely to change unless lawmakers or the courts rethink notions of "injury" and "harm" to encompass more than just fraud.
A judge's decision to allow MasterCard's settlement with Target to stand isn't likely to be appealed and could discourage banking institutions, some experts say, from continuing to pursue a breach-related class-action lawsuit they filed against the retailer.
Britain's Tory party has secured a majority in Parliament, which means the country will soon see a new legislative agenda. Here are some of the information security, privacy and surveillance initiatives to expect in the coming months.
Some federal lawmakers are concerned that passing a national data breach notification law would weaken security protections found in certain states' statutes. That's a major reason getting a national law enacted will prove difficult.
A federal appellate court decision that the National Security Agency's bulk data collection program is illegal could have sweeping ramifications beyond derailing the initiative to amass the metadata of Americans' telephone calls.
A federal appeals court has ruled that the National Security Agency's collection of metadata of Americans' telephone calls is not authorized by the Patriot Act. What impact with the decision have on the Congressional debate about NSA practices?
The U.S.'s move to EMV alone will not eliminate fraud because certain data elements could still be exposed in the breach of EMV card transactions, says Jeremy King of the PCI Security Standards Council, who highlights other essential security steps.
While companies know that attackers use deception with email-based attacks, how do they uncover an email's actual purpose or intent? Why do companies struggle in seeing beyond an attacker's deception?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.