In this video Stonesoft's director of cyber security, Jarno Limnell, comes to the SC Magazine offices to discuss military cyber security strategies that can be implemented by the enterprise.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
During a week of highly publicized website issues affecting Bank of America and JP Morgan Chase customers, a financial services industry body raised the cyber threat level in a warning to institutions.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
New research presented at this year's Black Hat conference in Las Vegas reveals that iris scans can be duplicated, which may give attackers the ability to bypass recognition systems.
Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.
A recent study finds that major enterprises have yet to catch on to the importance of cyber security.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
A new industry working group, the Industry Botnet Group, is aimed at developing a model that focuses on creating awareness, prevention and privacy concerning infected machines.
Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."
Sony's big 2011 breach was followed up by another attack that siphoned the King of Pop's entire music catalog.
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Experts at the RSA Conference in San Francisco exchanged thoughts on the importance of "working groups" and sharing threat intelligence.
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Cyber intrusions into Canada government sites announced in February did more damage than initially admitted.
A lone Iranian hacker claimed responsibility over the weekend for an attack on Comodo, a company that issues digital SSL certificates used by websites to validate their identity to visitors.
A Congressional probe into the activities of HBGary Federal follows revelations that the company, together with two other security firms, may have conspired to sabotage opponents.
Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?