DDoS attacks may be out of the headlines, but they have hardly disappeared as a significant business concern.
In this new 2015 DDoS Impact & Response Study of organizations in the U.S. and UK, we find:
55% of respondents say they have experienced as many or more attacks as in the past year;
60% say the attacks...
Security expert Alan Woodward is warning that enterprises should ditch RC4 after researchers demonstrated practical attacks that demolish the crypto that's widely used in enterprise WiFi devices and for TLS.
Virtualization and related developments bring significant changes to the architecture of today's data centers. At RSA Conference Asia Pacific & Japan, Cisco's Munawar Hossain defines these changes and outlines the new challenges.
Most organizations use open-source components to develop applications, but how do you use them safely without bringing additional risk into your organization? The last thing you need to be doing is introducing open source, well known vulnerabilities. For 78% of companies worldwide that use open source software in...
By now, organizations are well acquainted with DDoS. But do they understand the attacks' key components and how to mitigate them? Akamai's Matt Mosher shares the questions to ask when purchasing DDoS mitigation.
Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
As more enterprises adopt software-defined networking, hackers are finding the emerging technology to be a new route to penetrate organizations. Anthony Lim of (ISC)² recommends ways to secure SDNs against attacks.
In June 2015 the Healthcare sector once again received an overall SurfWatch Labs' risk score. On the vulnerability front, it was determined that most victims of the Stegoloader Trojan are North American healthcare organizations. The malware uses digital steganography to hide malicious code. Researchers believe...
With so much stolen PII available to fraudsters, it's time for banks and others to move to more sophisticated forms of authentication of customers' identities. Knowledge-based authentication is no longer reliable.
If you are an IT manager or administrator, you might have encountered compliance in this or that form. Though the topic is a hit these days, only few IT Pros can explain what compliance really means and what requirements it imposes on the IT processes within an organization. This free white paper is intended to...
At a hearing on the role the Interior Department played in a recent breach at the Office of Personnel Management, the Interior deputy inspector general painted a picture of how a hacker might have breached the agency's computer system.
Security researchers reported a zero-day bug to Microsoft - which has patched the flaw - after reverse-engineering details were contained in a bug hunter's sales pitch to hacked surveillance software vendor Hacking Team.
What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security?
Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Consider for a moment the most vital operation in your enterprise. It might run financial processing around the world, control a city's electrical distribution, or handle
millions of passengers' airline reservations. What happens to your business if the computers directing such operations are hacked, sabotaged or...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.