In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
This e-Book discusses:
Today's average level of breach...
As the borders of the enterprise dissolve in the mobile world, security becomes increasingly important and inherently more complex. Single Sign-On becomes the key to providing a convenient experience when accessing enterprise resources across web, mobile and APIs. Join this webinar to learn how the National Rural...
Ten months after NIST issued a draft report proposing changes on how it develops cryptographic standards, following reports that the NSA tampered with a NIST cryptographic algorithm, the institute has yet to finalize that guidance.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
The destructive code that was used to infect and erase hard drives at Sony Pictures Entertainment - and which apparently was the subject of a recent FBI "flash alert" - has been identified as "wiper" malware known both as Destover and Wipall.
The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks
and advanced threats can easily evade these controls.
Read the Q&A transcript featuring Damballa CTO Brian Foster. Discussion topics...
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Although it has been around for years, it has recently come back into the spotlight with Gartner's
research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of...
In the wake of the FBI issuing a warning that a U.S. business, reportedly Sony Pictures Entertainment, has been attacked using a dangerous form of "wiper" malware, security experts weigh in on the news and offer mitigation advice.
A confidential FBI "flash" alert is warning of "wiper" malware attacks - that delete hard drive content - against U.S. businesses. Security experts say the alert is tied to the hack of Sony Pictures Entertainment, which may be linked to North Korea.
Anti-virus firms Symantec, F-Secure, and Kaspersky Lab have been criticized for not issuing public alerts more quickly about powerful Regin espionage malware that has capabilities that reportedly rival Stuxnet and Flame.
Less than 48 hours after warnings first surfaced about espionage malware called "Regin," debate rages over who's been running the related attack campaigns, for what purpose, and if anti-virus vendors should have sounded warnings more quickly.
Stealth espionage malware known as 'Regin' or 'Regis' has been targeting government agencies, businesses and research institutes, with Russia and Saudi Arabia as prime targets, researchers say. But it's unclear what nation is behind the attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.