Threats

White House says new Chinese IT equipment rule may disrupt business without helping security

White House says new Chinese IT equipment rule may disrupt business without helping security By

Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.

Malware tries to invade technology companies once every 60 seconds

Malware tries to invade technology companies once every 60 seconds By

No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.

Video: Corporations defending IT infrastructure

By

John McClurg, vice president of Dell Global Security, discusses some of the threats posed to corporations today, and how security professionals should assess them in order to implement successful security strategies.

Public safety personnel targeted by DoS attacks flooding phone lines

By

Fraudsters pretending to be from collections companies are seeking to recover non-existent loans. If victims don't pay up, their administrative call centers are hit by telephone denial-of-service attacks. 9-1-1 lines weren't targeted.

Market for DDoS prevention to hit $870 million

By

Despite being an age-old problem, recent DoS and DDoS attacks are driving huge growth for mitigation solutions.

Sidestepping the humdrum

By

Among the humdrum there are cyber events cropping up here and there that breed excitement.

You are an APT target

You are an APT target

Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network By

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

News briefs: Mandiant uncovers espionage, Evernote is breached, and more

News briefs: Mandiant uncovers espionage, Evernote is breached, and more

This month's news briefs includes recent news on Mandiant uncovering China's cyber espionage efforts, security firm Bit9's breach, and the Obama administrations latest efforts on combating the theft of trade secrets.

Stopping distributed denial-of-service attacks

Stopping distributed denial-of-service attacks By

FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.

Web-based malware threats primary challenge for industry pros, survey says

By

Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.

IRS warns phishing attacks are among "dirty dozen" tax scams

IRS warns phishing attacks are among "dirty dozen" tax scams By

Phishing attacks were among the top 12 schemes hatched by tax season scammers.

A new perspective: Compromised computing

A new perspective: Compromised computing

Lets just stop preventing what seems to be unavoidable and figure out how to enable our users to operate securely on a completely compromised device.

Alleged fight between anti-spam group and blacklisted company incites massive DDoS

Alleged fight between anti-spam group and blacklisted company incites massive DDoS By

Spam-fighting nonprofit Spamhaus says the DDoS attacks began more than a week ago.

Video: Advanced attacks in today's threat landscape

By

In this video, Greg Masters, managing editor for SC Magazine, sits with Tomer Teller, security evangelist and researcher for Check Point Software Technologies, to discuss some of the advanced threats that enterprises are facing today.

DDoS attack strikes JPMorgan Chase website

By

A representative of JPMorgan Chase has confirmed the website of the banking giant suffered a distributed denial-of-service attack Tuesday.

Eight creative strategies to address the sophisticated adversary

Eight creative strategies to address the sophisticated adversary

Tupac Shakur once sang, "The old way isn't working so it's on us to do what we gotta do to survive." That too goes for information security professionals, who are being tested like they've never been tested before.

Video: Evolving threat tactics and the targets

By

In this video Danielle Walker, reporter for SC Magazine, sits with Don Grey, chief security strategist at Solutionary, to discuss the major highlights of the report.

Sponsored video: Don Gray, chief security strategist, Solutionary

In this video shot at RSA Conference 2013, Don Gray, chief security strategist at Solutionary, goes InFocus with Eric Green, program director at SC Magazine.

Sponsored video: Philippe Courtot, chairman and CEO of Qualys, at RSA Conference 2013

By

In this video shot at RSA Conference 2013 in San Francisco, Illena Armstrong, VP of editorial at SC Magazine, sits with Courtot to discuss some of the big problems facing CISOs today, as well as his thoughts on this year's big conference.

Sponsored video: John Summers, vice president of security business at Akamai Technologies

In this video shot at RSA Conference 2013 in San Francisco, Eric Green, program director at SC Magazine, chats with Summers about prevalent threats today and the possible solutions enterprises can utilize.

MiniDuke espionage ring began earlier than first reports suggest

By

Attackers behind the MiniDuke spy campaign have targeted government entities and other organizations around the world since at least 2011.

RSA 2013: Manipulation, then password theft, is the modus operandi of advanced attackers

By

A session on spear phishing dissected a slew of attacks used against organizations.

Threat of the month: Java zero-day

Threat of the month: Java zero-day

Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.

Losing control: Critical infrastructure

Losing control: Critical infrastructure By

Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.

CSO of the Year: John South, Heartland Payment Systems

CSO of the Year: John South, Heartland Payment Systems By

John South joined Heartland Payment Systems when it still was reeling from a devastating breach...and it's the best career decision he's ever made. Dan Kaplan reports.

News briefs: NY Times and Twitter hacked, cyber security executive order, and more

By

Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.

RSA 2013: CISOs make security - and business - sense of new technologies

By

CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.

The new fundamentals of security

The new fundamentals of security

We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.

Sign up for our newsletters

POLL