The New York Institute of Technology 6th Annual Cybersecurity Conference was held on Thursday in Manhattan.
Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when a CISO is trying to secure an infrastructure over which he or she has no physical access.
Schneider Electric released updated firmware to patch a remotely exploitable vulnerability for its StruxureWare Building Expert building automation system.
When it comes to security many corporate employees are willing to take the risk of using unsecured, third-party apps if it means making their job easier, a new IBM Security study found.
Designing user authentication systems for applications is often seen as a trade-off between security and the user experience, but Ant Allan at Gartner says it needn't always be thus.
The U.S. Department of Energy's systems were compromised - successfully - more than 150 times in just four years.
Following a number of recent headline-grabbing breaches, a panel of foreign relations experts convened at the Atlantic Council to discuss retaliation against hackers.
A secret NSA map was obtained by a news outlet shows the locations of "Victims of Chinese Cyber Espionage" targets based in the U.S.
Japan will train approximately 50,000 people in the public and private sectors on cyber-security ahead of the 2020 Summer Olympics in Tokyo, according to local reports.
A study by Lloyd's of London and the Centre for Risk Studies at Cambridge University predicted severe losses in a catastrophic attack on the power grid and a separate poll found that voters were worried as well about those attacks.
From June 8 through June 26 more than 100 organizations participated in the fourth annual Cyber Guard exercise.
The attacks reportedly date back a year, and happened as recently as Tuesday morning.
IOActive, Kaspersky Lab, and the Cloud Security Alliance are among the security organizations supporting the effort.
Trend Micro and the Organization of American States (OAS) polled 575 critical infrastructure security leaders in the Americas.
On Wednesday, the President declared the need to address "malicious cyber-enabled activities" orchestrated by foreign attackers a national emergency.
Four GE products and one MACTek product are impacted by the vulnerability, according to ICS-CERT.
Shared Services Canada plans to spend $55 million to upgrade IT infrastructure.
The updated guide will offer insight on reducing risks to industrial control systems, such as malware, equipment failures, and other threats.
A German iron plant fell victim to a cyberattack that caused physical damage, according to a report on Wednesday from a German federal agency.
The U.S. House of Representatives and the Senate passed to the CyberSecurity Enhancement Act of 2014, giving NIST the go-ahead to develop voluntary cyber standards for critical infrastructure.
The U.S. House of Representatives unanimously approved three bills, including the Critical Infrastructure Protection Act.
The attacks were detected and incident response began immediately, with unscheduled maintenance being performed to mitigate the threat.
The Department of Energy contract will allow Norse to support the agency's Cybersecurity Risk Information Sharing Program (CRISP).
Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
Following U.S. military airstrikes in the Middle East, the FBI has issued a warning regarding possible cyber threats aimed at U.S. networks and critical infrastructure by hacktivists in support of ISIS.
Two Trend Micro experts sit with us to discuss research they've conducted concerning critical infrastructure and the future of the threat landscape.
Though no attacks were successful, ICS-CERT said the incidents show a glaring need for operators to remain vigilant in monitoring and thwarting network intrusions.
The vulnerability was found in two programmable gateway devices often used by auto, food and manufacturing businesses in the United States. Meanwhile, a new study shows attacks against utility companies are growing.
While a major attack has yet to take place on the U.S. energy sector, now is the right time for these critical infrastructure providers to ready their defenses.
Sign up to our newsletters
SC Magazine Articles
- FBI-issued spyware leads to arrest of child pornography suspect
- Security researcher reveals Kaspersky zero days
- Companies leaving known vulnerabilities unchecked for 120 days: Kenna
- Stored XSS vulnerability identified in Jetpack plugin for WordPress
- Credit card security takes a step forward today with EMV cards