April 08, 2013
Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.
April 03, 2013
No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.
John McClurg, vice president of Dell Global Security, discusses some of the threats posed to corporations today, and how security professionals should assess them in order to implement successful security strategies.
Fraudsters pretending to be from collections companies are seeking to recover non-existent loans. If victims don't pay up, their administrative call centers are hit by telephone denial-of-service attacks. 9-1-1 lines weren't targeted.
Despite being an age-old problem, recent DoS and DDoS attacks are driving huge growth for mitigation solutions.
Among the humdrum there are cyber events cropping up here and there that breed excitement.
April 01, 2013
Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.
April 01, 2013
Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.
April 01, 2013
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.
April 01, 2013
This month's news briefs includes recent news on Mandiant uncovering China's cyber espionage efforts, security firm Bit9's breach, and the Obama administrations latest efforts on combating the theft of trade secrets.
April 01, 2013
FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.
Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.
March 28, 2013
Phishing attacks were among the top 12 schemes hatched by tax season scammers.
March 28, 2013
Lets just stop preventing what seems to be unavoidable and figure out how to enable our users to operate securely on a completely compromised device.
Spam-fighting nonprofit Spamhaus says the DDoS attacks began more than a week ago.
In this video, Greg Masters, managing editor for SC Magazine, sits with Tomer Teller, security evangelist and researcher for Check Point Software Technologies, to discuss some of the advanced threats that enterprises are facing today.
A representative of JPMorgan Chase has confirmed the website of the banking giant suffered a distributed denial-of-service attack Tuesday.
March 13, 2013
Tupac Shakur once sang, "The old way isn't working so it's on us to do what we gotta do to survive." That too goes for information security professionals, who are being tested like they've never been tested before.
In this video Danielle Walker, reporter for SC Magazine, sits with Don Grey, chief security strategist at Solutionary, to discuss the major highlights of the report.
In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.
In this video shot at RSA Conference 2013 in San Francisco, Illena Armstrong, VP of editorial at SC Magazine, sits with Courtot to discuss some of the big problems facing CISOs today, as well as his thoughts on this year's big conference.
In this video shot at RSA Conference 2013 in San Francisco, Eric Green, program director at SC Magazine, chats with Summers about prevalent threats today and the possible solutions enterprises can utilize.
Attackers behind the MiniDuke spy campaign have targeted government entities and other organizations around the world since at least 2011.
A session on spear phishing dissected a slew of attacks used against organizations.
March 01, 2013
Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.
March 01, 2013
Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.
March 01, 2013
John South joined Heartland Payment Systems when it still was reeling from a devastating breach...and it's the best career decision he's ever made. Dan Kaplan reports.
Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
February 27, 2013
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.