The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.
How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.
Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
DHS Secretary Jeh Johnson taps Andy Ozment, assistant secretary of the Office of Cybersecurity and Communications, to undertake overall and direct charge for the National Cybersecurity and Communications Integration Center.
Enough talk about the cybersecurity skills gap; it's time for a new strategy for filling it, says ISACA's Eddie Schwartz. The new CSX Practitioner certification is a step in the right direction, he says.
The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.
Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.
Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.
Georgia Tech researchers are attempting to develop new processes and technologies to more easily detect malware. The goal, researcher Wenke Lee explains, is to find an effective way to identify and expunge advanced persistent threats
"Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.
An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.
Organizations are jumping on the threat intelligence bandwagon, but are they making strategic investments? Often not, says BrightPoint Security's Rich Reybok, who says "context" is often the key missing element.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.