Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Beyond a reasonable doubt is that using a defense in depth strategy makes it substantially more difficult for cyber criminals to obtain sensitive information.
A Cyphort Labs report provides an in-depth analysis of Backoff, BlackPOS and FrameworkPOS, malware used in some of the biggest breaches.
The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices (iOS, Android).
A security firm highlighted the ways that U.S. defense contractors have reassessed their security programs to stave off insider threats.
With endless amounts of talks taking place at the end of the month in San Francisco, we caught up with Paul Lipman, CEO of Total Defense, to see what's on his radar for RSA Conference 2014.
The coordinated effort includes a newly formed cyber cell comprised of officials from the NSA, FBI and Britain's GCHQ and MI5.
Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.
This is another market area that has seen a lot of change over the past few years.
A report by Ari Kaplan Advisors and sponsored by Nuix found most infosec pros collaborate with data managers.
Sergei Tsurikov was sentenced to 11 years in prison after he helped steal more than $9 million from a payment processor. This week also yielded research that suggested point-of-sale (POS) malware attacks increased greatly in Q3. Up to 138,00 events could be seen in one day. For...
A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.
Fortinet and Palo Alto Networks expect to lure other security vendors to join and share intelligence to thwart malware at the network level.
Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.
Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.
Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.
Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.
This week's prominent news includes the arrest of an infamous hacker, small businesses being hit by new point-of-sale malware, and a big restaurant chain launching an investigation into a possible data breach involving customer credit cards. For more deeper look at these news bits, click here to visit our...
For a closer look at these articles, click here to visit our news section.
As global organizations work to stay ahead of cyber attacks, they require information security analysts to help steer them through risk assessment, vulnerability assessment and defense planning.
This week's news included another retailer confirming a breach, a nasty trojan compromising thousands of Unix and Linux servers, and a new study indicating that nearly $500 billion will be spent in 2014 on recovery initiatives when dealing with data breaches and malware. For more deeper look at these...