The ground has shifted under most enterprise IT security staff. Breaches are now capturing prime-time air across mainstream media outlets. As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet...
Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim at businesses of all sizes in all sectors, rather than consumers. That's why employee education is so critical.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it's not...
Many organizations are not aware of the targeted attacks and advanced threats that readily breach existing security defenses. Today's attackers conduct advance reconnaissance on their targets, in order to custom-design advanced malware attack methods that are specifically designed to evade detection. To protect data,...
Today's security landscape is scarier than ever due to a dangerous new breed of targeted attacks. Organizations are blind to advanced threats that cloak themselves by using a variety of means and methods to escape detection. Targeted or spear-phishing email attacks have become the preferred method to gain a foothold...
Cybercriminals are increasingly using spear-phishing emails to get users to click malicious links or to open malicious file attachments, laterally moving across target networks, maintaining persistent access to breached networks, and using other techniques more typical of threat actors. While the concept of using...
Cybercrime now costs the average US enterprise $12.7 million annually. Increasing volume and complexity of compliance requirements is attracting executive attention, with 47% of companies increasing their compliance staff and 45% of companies increasing their compliance budget.
Download this infographic to...
Efficiently transmitting mission-critical modeling and design files between multiple teams in worldwide offices is instrumental to the success of today's architecture, construction and engineering professionals. But as projects span across the globe, a smarter set of secure data exchange tools are required to bridge...
Considering the massive scale and cost of payment system breaches that have made headlines in recent months, it is clear that - if there were ever a time to take short cuts or do the bare minimum in securing sensitive payment data - this is not it. While the need to secure payment transactions and data remains...
For the security teams tasked with safeguarding sensitive payment information, significant challenges and opportunities continue to arise. Once sensitive payment assets started being managed in digital format, those assets needed to be secured; that's one thing that hasn't changed over the past decade. However,...
Learn how threats like malware and various social engineering techniques are used to commit fraud and create data breaches in the financial services market. You will also gain an understanding of the differences between passive and active defenses and how to select and deploy an active defense - all to stop the bad...
Both Microsoft and Apple this week released patches to address the so-called "Freak" flaw in SSL/TLS. Microsoft also released a fix that addresses a failed 2010 patch for a vulnerability that was exploited by the Stuxnet malware.
During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.