Industry Insight

IBM security expert panel: Fighting today's advanced attacks with behavioral-based prevention

With security incidents becoming a weekly, if not daily, occurrence, organizations need proactive, preventative security measures to protect themselves and their customers. Hear from a diverse panel of IBM Security experts.

The car alarm syndrome and the high cost of too many security alerts

The car alarm syndrome and the high cost of too many security alerts

Sophisticated bad guys are likely to assume that high-value targets have deployed the latest security technologies - this has been the case going back over a decade.

Why it's time to replace the tootsie pop approach to network security

Why it's time to replace the tootsie pop approach to network security

How did we arrive at this approach to network security and, more importantly, what's happening today that's causing us to seriously rethink this approach?

The one-two punch of cybercrime: Who's leading the fight?

The one-two punch of cybercrime: Who's leading the fight?

Whose responsibility is it to lead the fight against cybercrime and protect valuable health care data? The answer: it's not just one person.

Yahoo Trust 'UnConference' to convene after RSA Conference

Yahoo Trust 'UnConference' to convene after RSA Conference

By

The event is said to be TrustyCon's successor.

FTC announces new initiative aimed at tech research

By

The FTC's Office of Technology Research and Investigation will focus on research and the investigation of issues on emerging technology.

Why enterprise IT and security teams should talk more

Why enterprise IT and security teams should talk more

The "It won't happen to me" mentality combined with communication gaps between the IT and security teams greatly increases enterprises' risk of being breached.

Developer liability, data proliferation at center of FTC report on IoT

Developer liability, data proliferation at center of FTC report on IoT

The truth is simply that none of us, including the FTC and Ofcom, fully know or understand the extent for which the unintended consequences of IoT will show its ugly head.

Malvertising has a big impact

By

In this video, Manoj Leelanivas, president and CEO of Cyphort, discusses how malvertising works, the impact of the threat, and how the issue can be addressed.

Kaspersky rebuffs Bloomberg's claims

By

Kasperky Lab CEO and founder Eugene Kaspersky blasted a Bloomberg Businessweek report that claimed he holds intimate ties with the former KGB.

Researchers earn $442,500 at Pwn2Own 2015

By

The two-day hacking competition ended on Thursday.

White House names former Facebook exec as first IT director

By

The White House announced that former Facebook executive David Recordon will serve as the first ever director of White House information technology.

What we can learn from $1 billion bank-robbing malware

What we can learn from $1 billion bank-robbing malware

If we can learn anything from the Carbanak malware, it is to use stealthy and evasive maneuvers in the security technology and education we deploy within enterprises to fight fire with fire.

Lynx-sponsored fellowship aimed at women, minorities

By

Lynx will throw its support behind ICMCP's efforts to bring more minorities into cyber security by sponsoring fellowship.

iPad POS security

By

David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.

Facebook received 14,274 U.S. gov't requests in 2014 H2

Facebook received 14,274 U.S. gov't requests in 2014 H2

By

Facebook said that at least some data was produced for nearly 80 percent of the requests.

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

By

Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.

RSA hires Zulfikar Ramzan as CTO

By

RSA announced earlier today that it has named Zulfikar Ramzan as the company's chief technology officer.

Protect people, not machines

Protect people, not machines

Perimeter security has only brought us so far. It's time to embrace a user-centric model instead.

Private WHOIS data disclosed for hundreds of thousands of Google Apps domains

Private WHOIS data disclosed for hundreds of thousands of Google Apps domains

By

A software glitch exposed the private WHOIS information of 94 percent of the nearly 306,000 domains registered via Google App using eNom, Cisco Talos found.

Policy driven development: Bringing DevOps to InfoSec

Policy driven development: Bringing DevOps to InfoSec

In order to show risk is being properly managed, security teams are often regarded as gatekeepers who slow the pace of software development due to what is perceived as their authoritative behavior.

Why developers need to think about security

Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.

Former Mandiant chief architect to lead research team at Endgame

By

Endgame has named Jamie Butler as chief scientist.

Bain Capital acquires Blue Coat Systems for $2.4 billion

Bain Capital acquires Blue Coat Systems for $2.4 billion

By

Blue Coat Systems, Inc., a Sunnyvale, Calif.-based enterprise security solutions provider, has announced that it will be acquired by Bain Capital for $2.4 billion.

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

By

Trustwave polled security professionals on the pressures they felt this past year to keep their enterprise secure.

Study: Fraud losses drop by $2 billion in 2014

Study: Fraud losses drop by $2 billion in 2014

By

A new study from Javelin Strategy & Research has found that both the fraud rate and the amount of money lost to fraud decreased this year.

FTC inks privacy collaboration deal with Dutch DPA

By

The new memorandum of understanding signed by both data protection agencies will bolster collaboration and privacy-related information sharing.

Playing defense in ranks: Cybersecurity reimagined

Playing defense in ranks: Cybersecurity reimagined

Technological innovation is now increasingly consumer led forcing organizations to adopt faster to serve them or it diffuses into the work environment leaving the traditional IT to play catch-up.

Tsukuba trojan aimed at Japanese banking customers

Tsukuba trojan aimed at Japanese banking customers

By

The Tsukuba trojan like other proxy changers is not technically advanced but uses an interesting social engineering technique, researchers at IBM Trusteer found.

Obama criticizes Chinese cybersecurity regs

By

President Obama told Reuters that cybersecurity requirements proposed by China need to change if the country wants to do business with the U.S.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US