Industry Insight

DDoS attacks increase and methods changed in Q1 2015, report says

DDoS attacks increase and methods changed in Q1 2015, report says

By

Akamai's Q1 State of the Internet Report shows an increase in frequent, longer lasting low bandwidth attacks.

Study: Employees acknowledge risky security behavior, continue to engage in it

Study: Employees acknowledge risky security behavior, continue to engage in it

By

While most people acknowledge the security risks of opening an email from an unknown sender or downloading an app from an unauthorized app store, many continue to engage in this risky behavior.

Hack of airplane systems described in FBI docs raises security questions

Hack of airplane systems described in FBI docs raises security questions

By

Claims that researcher Chris Roberts actually, briefly, commandeered a plane in flight after hacking its entertainment systems may be up for debate; contentions that the aircraft may be vulnerable are not.

Distil Networks 2015 Bad Bot Report: 5 high-risk lessons

Distil Networks has produced their annual Bad Bot Report. It's the IT Security Industry's most in-depth analysis on the sources, types, and sophistication levels of last year's bot attacks-- and there are serious implications for anyone responsible for securing their web infrastructure.

Black Hat unveils selections for Vegas briefings

By

For its 18th year in Las Vegas, Black Hat received its largest pool of submission yet from security pros.

NEWS ALERT: Penn. police searching for IT security pro's missing son

NEWS ALERT: Penn. police searching for IT security pro's missing son

By

Mason Pachulski, the son of Keith Pachulski, was last seen this morning outside his family's home in Jim Thorpe, Penn.

U.S. Defense Secretary Carter emphasizes culture change needed to hire fresh tech talent

U.S. Defense Secretary Carter emphasizes culture change needed to hire fresh tech talent

By

During a speech at Stanford University this past week, U.S. Defense Secretary Ash Carter acknowledged the government's desire to hire young talent for cybersecurity work.

RSA 2015 survey: 48 percent believe NSA surveillance has increased

RSA 2015 survey: 48 percent believe NSA surveillance has increased

By

Nearly 94 percent of respondents believed that NSA's surveillance had increased or remained the same since Snowden began leaking classified information in June 2013.

RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community

RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community

By

The counterterrorism, security and aviation communities must contemplate how unintended use of aircraft systems or networks could have a downstream impact.

RSA 2015: Time for a paradigm shift in cyber-security?

RSA 2015: Time for a paradigm shift in cyber-security?

'Is cyber-security in enough of a crisis to need a paradigm shift?' asks Dan Geer, CISO of In-Q-Tel, at RSA.

RSA 2015: Keynote addresses online safety risks to increasingly connected youths

RSA 2015: Keynote addresses online safety risks to increasingly connected youths

By

Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.

RSA 2015: Experts talk investor interest in cybersecurity, regulatory changes on horizon

RSA 2015: Experts talk investor interest in cybersecurity, regulatory changes on horizon

By

An SEC commissioner's chief of staff and shareholder advocacy expert discussed complex disclosure expectations among investors.

Cybersecurity organizations meet to discuss lack of qualified security pros

By

More than a dozen cybersecurity organizations met earlier this week to discuss plans to establish a framework for resolving the "shortfall of qualified people in the cybersecurity profession."

Manny Rivelo set to take over as president and CEO of F5 Networks

By

Manny Rivelo was named president and CEO of F5 Networks, an application solutions provider, this week.

RSA 2015: It's end of days for email forgers claim DMARC champions

RSA 2015: It's end of days for email forgers claim DMARC champions

The death of email, widely anticipated 10 years ago, has not come to pass, thanks to email authentication schemes such as SPF, DKIM and most recently DMARC.

RSA 2015: Panelists debate a way forward for matters of cyber conflict

RSA 2015: Panelists debate a way forward for matters of cyber conflict

By

Panelists discussed cyber espionage and intellectual property theft affecting U.S. companies and steps the private and public sector must take to curb the threat.

RSA 2015: Knowing which way the wind's blowing

RSA 2015: Knowing which way the wind's blowing

Sharing of industry and government data, collated centrally to create a cyber-threat weather map is now underway in the U.S., with threat indicators being issued.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

By

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

RSA 2015: Change is a mindset, not a technology problem

RSA 2015: Change is a mindset, not a technology problem

By

The threat landscape has changed and we have to constantly challenge the existing thinking to get ahead of our adversaries RSA President Amit Yoran told delegates on Tuesday.

Study: Open Source Software use increasing in enterprises but without vulnerability monitoring

Study: Open Source Software use increasing in enterprises but without vulnerability monitoring

By

As companies increasingly integrate Open Source Software (OSS) into their business IT environments, they appear to be faltering in monitoring the software for vulnerabilities and creating official policies and procedures.

Raytheon to acquire Websense in $1.9 billion deal

By

Raytheon Company will acquire Websense later this year in a $1.9 billion deal with Vista Equity Partners.

IBM launches free collaborative threat-sharing platform

By

IBM launched a cyber threat intelligence sharing platform on Thursday that the company is billing as a social media network for security analysts.

Study: Average organization has 4,000 instances of exposed credentials stored in the cloud

Study: Average organization has 4,000 instances of exposed credentials stored in the cloud

By

CloudLock released its "Cloud Cybersecurity Report: The Extended Perimeter" earlier this week that looked at enterprises' use of cloud applications and storage.

Resolution1 lays off global marketing team, focuses on customers, R&D

By

After splitting from AccessData in 2014, the security start-up has decided to restructure to focus on customers and product development.

2014 deemed the year of 'far-reaching' vulnerabilities in Symantec annual report

2014 deemed the year of 'far-reaching' vulnerabilities in Symantec annual report

By

Symantec's annual threat report doesn't exactly depict a rosy cyber security world.

In annual report, Verizon uses new breach cost model for estimating loss

In annual report, Verizon uses new breach cost model for estimating loss

By

Verizon says it has a new-and-improved model for determining breach costs.

APT group detects threat monitoring and backs away in documented first

APT group detects threat monitoring and backs away in documented first

By

After continuously trying to regain access to a specific target's systems, Hurricane Panda willfully stepped away once it saw that the company was monitoring Indicators of Attack (IOA).

Symantec maintains its plans to split from Veritas

By

Symantec confirmed its plans to separate itself from its Veritas data-storage and recovery business by the end of 2015 on Monday.

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Breach readiness survey shows most stray from IRP best practices

Breach readiness survey shows most stray from IRP best practices

By

The responses of global practitioners were compared with Global 1000 security execs, which provided a best practices benchmark.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US