Distributed-denial-of-service attacks are not new, but they are being taken more seriously as a threat to network security and data protection, especially by financial-services, says Ashley Stephenson of Corero Network Security.
The idea that smartphone apps can "put your business in the world's pocket" is driving the financial industry to rush to mobile applications. As a result, business elements that used to be physically secure are now being exposed to the general public. Couple that with a relatively young, chaotic mobile ecosystem, and...
Debate over cybersecurity bills last year coupled with recent, highly publicized attacks have raised the visibility of the threat, and that could push Congress to enact IT security legislation in 2013, White House Cybersecurity Coordinator Michael Daniel says.
A new study says, on average, it takes 87 days to first recognize that insider fraud has occurred. Why the delay? Researcher Larry Ponemon and Christine Meyers of Attachmate Luminet discuss the findings.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
Your organization has been attacked or threatened, and you can trace the actor. Should you "hack back" in response? Two noted information security and privacy attorneys discuss the merits of active defense.
Homeland Security Deputy Undersecretary Mark Weatherford says the federal government will provide appropriate funding to keep the federal government IT secure even if President Obama and Congress fail to prevent automatic, across-the-board budget cuts scheduled for March 1.