Researchers at RiskAnalytics have watched a botnet of compromised computers in the Ukraine and Russia become a growing hive of criminal activity, playing a role in everything from ransomware and click fraud to spam bots and stolen payment card marketplaces.
Dropbox is keeping a close eye on the latest news reports of big-name, big-data breaches, but says the reported hackers are bluffing when claiming to have compromised and obtained the web storage service's data.
The scale of the global IT security skills crisis is well documented. But what is its direct impact on cybersecurity with the government agencies of Washington, D.C.? Dan Waddell of (ISC)² discusses the problem - and a new way to address it.
The digital banking shift creates great convenience - for the fraudsters, as well as the customers. What can institutions do to reduce their vulnerability to breaches and fraud? Dave Allen of Bottomline Technologies offers advice.
In an interview about changing banks' defensive posture from reactive to proactive,...
Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
"New school security awareness training takes a different approach," he...
Recognizing the reputational and regulatory imperatives to protect data, financial
institutions are looking for new, holistic solutions, Logan says.
"How do they solve this problem across all their different access points they have with
their customers, their partners, their vendors?" he says. "They have to...
Now that both the FBI and the FFIEC have issued alerts calling attention to the risks associated with interbank messaging and wholesale payments in the wake of SWIFT-related heists, U.S. institutions should brace for more regulatory scrutiny of bank-to-bank payments, financial fraud experts say.
Cybercrime continues to be incredibly lucrative. Yet many of the techniques being wielded by connected criminals aren't new, said security expert Mikko Hypponen of F-Secure in a keynote speech at this week's Infosec Europe conference in London.
Akamai warns of a rash of less sophisticated attempts to extort companies by threatening to strike with distributed denial-of-service attacks, which can be expensive for organizations to defend against.
Many organizations still fail to practice smart web security, warns penetration testing expert Ilia Kolochenko, who notes that 23 percent of all websites still use SSL version 3, despite it leaving them at risk from POODLE and BEAST attacks.
From Anthem to OPM, the news continually alerts us to highprofile
breaches that involve the compromise of critical data.
And as breach incidents and costs mount, security leaders
must ask: How secure are our data centers? What should we
do differently in our security strategy?
Some facts upfront: 59 percent of...
This ISMG Security Report features a discussion of the impact on the global financial services industry of the SWIFT-related theft of $81 million from Bangladesh's central bank and similar thefts. You'll also hear reports on making IT systems more trustable and national governments' spending on cybersecurity.
NIST plans next year to clarify certain provisions in its cybersecurity framework. "Just to be clear, we're not headed toward a version 2.0 right now," Program Manager Matt Barrett explains in an interview. "We're headed to something that's more like a 1.1."
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business critical applications to the cloud is becoming a growing priority for companies of all sizes. This paper examines the root cause behind the confusion, some unfortunate real-world results due to the...
Increased agility enabled by cloud computing has created a "cloud first" strategic imperative for many organizations. Leveraging the power of cloud apps and on-demand infrastructure is essential for competitive advantage, if not parity, as is mitigating the associated risks and costs. However, existing security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.