The FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive "wiper" malware attacks.
Premera Blue Cross already is facing five class action lawsuits in the wake of its massive data breach. Meanwhile, its CEO has provided some answers to questions posed by a U.S. senator regarding the hacker attack.
DDoS attackers have been targeting the popular code-sharing website GitHub. Security experts say the massive attacks appear to have originated from China and been designed to disrupt access to GitHub-hosted anti-censorship tools.
In the past, the only discussions people had about email were focused on the never-ending inbox and the amount of time wasted filtering through it. The Snowden revelations changed all that. Suddenly, every mainstream media outlet was covering email and its lack of security. Companies reconsidered how they sent...
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
Just when you thought it was safe to go mobile, everything is different.
The risks are different. Only a few years ago, predictions stated that smartphones and tablets had little vulnerability to malware and hacking. But in the one-year period ending March 2013, malware aimed at mobile platforms grew 614 percent,...
Combatting advanced cyberthreats grows more challenging every day. With up to a third of enterprise Internet traffic now being encrypted, cybercriminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits. But even if all...
Network encryption is a security best practice as it protects the privacy and confidentiality of network traffic as it travels from source to destination. While this can be beneficial, security professionals understand that network encryption can also be used for malicious purposes. Cyber-criminals and hackers can...
The cloud and mobility are disrupting the way IT builds and delivers value for organizations. Perhaps you are moving computing workloads to the cloud and storing an increasing amount of data outside the corporate perimeter, or maybe an increasing proportion of employees now access data from outside your corporate...
Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.
The House Intelligence Committee has approved cyberthreat information sharing legislation that its leaders developed. Meanwhile, a national data breach notification bill has been introduced that's modeled on language proposed by the White House.
The proliferation of smart devices has created a new breed of informed, always-connected shoppers, who demand real choice when it comes to selecting and purchasing goods. At the same time, breaches of sensitive information are announced almost weekly and retailers struggle to balance customer service and critical...
Financial services organizations are primary targets for increasingly sophisticated - and numerous - security attacks. In fact, a 2012 Ponemon Institute study revealed that 64 percent of US retail banks surveyed experienced a distributed denial of service (DDoS) attack during the previous 12 months. In September 2012...
Breaches happen. In today's high-value, high-stakes enterprise environments, many organizations rightly assume not only that their data and computing systems will be attacked, but that a certain number of attacks will succeed.
But recognizing the problem is only the first step - because the corollary to the...
The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today's security problems. Security needs to process a broader and richer data set including network and big data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.