The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.
More than 200 defense specialists gathered during the drill which was aimed at government and private industry groups.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.
With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
The attack du jour, APTs, or advanced persistent threats, are real threats.
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Cyber intrusions into Canada government sites announced in February did more damage than initially admitted.
A Congressional probe into the activities of HBGary Federal follows revelations that the company, together with two other security firms, may have conspired to sabotage opponents.
Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?