The discovery of a serious remote code execution flaw in Trend Micro's consumer security software - now patched - is a reminder that even security software has code-level flaws. But shouldn't security vendors be held to a higher standard than others?
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
The former Morgan Stanley financial adviser who in September pleaded guilty to stealing confidential customer information and saving it on his home server will not serve time in prison, even though some of that data was posted online.
New details emerging about a breach involving a former Morgan Stanley employee illustrate how a case of inappropriate access to data can blossom into something much more serious. The case shines a spotlight on the urgent need to mitigate insider threats.
While cyberattacks will continue to menace healthcare and other business sectors next year, organizations can't afford to overlook addressing risks tied to insiders, who are responsible for most data breaches, says Michael Bruemmer of Experian Data Breach Resolution.
Legislation pending before both houses of Congress, if enacted, would change a nearly 30-year-old law to require the government to obtain a warrant to access the content of emails that are 180 days old or older. Why do some agencies oppose the proposal?
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy. How is the threat landscape changing? And how should companies defend...
In this second video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the evolution of technological capabilities to defend organizations against increasingly complex cyber attacks.
In this third video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, sits down with Securonix CEO Sachin Nayyar to discuss today's insider threats.
In this final video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the role of Government in the ongoing cyberwar.
Despite the focus on external cyberattacks, insider attacks are almost as common and can potentially cause significantly more damage, says Michael Theis of Carnegie Mellon's CERT Insider Threat Center. In a video interview, he describes how science-based models can help organizations fight the battle from within.
FBI Director James Comey's declaration that the Obama administration will not pursue legislation to require vendors to create a backdoor that would permit law enforcement to circumvent encryption on mobile devices isn't the end of the matter.
Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.