Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
To improve system security, enterprises need to track hardware and software on their networks, address known vulnerabilities and take advantage of event logging, Defense Information Systems Agency → Read More
Done right, data analytics and machine learning can help companies reduce the amount of data they need to parse and highlight potential threats. However, experts warn that the improper use of security data science can overwhelm information security analysts. → Read More
Misconfigurations and application vulnerabilities continue to undermine security the security of containerized applications that companies are deploying in the cloud. Here are five ways to secure them. → Read More
Security experts say there is no evidence that Distributed Denial of Service attacks will hit an upper limit for bandwidth after two recent attacks crossed the 1 Tbps threshold. → Read More
Most enterprises that have moved to the cloud are managing hybrid environments that retains keep much of the organization data assets in house. Here is a seven-step process for securing cloud and on-premises environments. → Read More
Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware, according to security firm Zscaler. Microsoft has warned about the issue but does not consider it a vulnerability. → Read More
Security firm Flashpoint has discovered that cyber-criminals are likely breaking weak passwords rather than using software flaws to infect remote desktop protocol (RDP) servers that they use to anonymize their attacks. → Read More
CloudBleed and TicketBleed hit different parts of the cloud infrastructure but show that cloud services can fail significantly. Will such Black Swan events turn off companies to the cloud? → Read More
Cyber-security experts say states and local governments have a lot of obstacles to overcome when it comes to cyber-security. → Read More
Security researchers say data breach costs are difficult to estimate because breaches cause so many different types of losses that often go unreported. → Read More
More than half of small businesses do not have regular access to security experts, and two-thirds have no training or certification in security. → Read More
Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing. → Read More
Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it. → Read More
Research shows that, unless consumers know where the drive came from, they should return them, not plug them in. → Read More
Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security. → Read More
While industry reports cite a rise in data breach incidents, academic researchers find few signs that the threat is getting significantly worse. → Read More
Criminals are becoming more organized by employing teams of developers that create more sophisticated malware that produces larger monetary gains, states an IBM report. → Read More
The White House calls for more investment in protecting data and proposes to spend $19 billion this year on a variety of security initiatives, including educating consumers to use two-factor authentication. → Read More
Adversaries have learned a lot from defenses designed to detect advanced security attacks. Cyberthreats in 2016 require security and risk management. → Read More
We look at 10 trends, from ransomware incidents to malware-less attacks from nation-states, that will likely play a pivotal role in security in 2016. → Read More