Regulators Detail Destructive Malware, Cyber-Attack ThreatsThe FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive... Read more »
Windows 8.1 Vulnerability Unfixed After 90 Days, Google SaysMicrosoft says it's prepping a patch for a Windows vulnerability that was recently disclosed by Google. The search giant's 90-day deadline for vendors to... Read more »
U.S. Takes Action After Sony Pictures AttackHolding North Korea responsible for the cyber-attack on Sony Pictures Entertainment, President Obama on Jan. 2 imposed sanctions on 10 individuals and three entities associated with... Read more »
More and more, the applications that run your business expand beyond your organization's control to cloud-based services and partner-hosted websites. With so many separate sets of credentials and different login processes to... Read more »
CIOs and CISOs invest millions of dollars to secure their organization and keep would-be attackers out of their networks. But despite these investments, determined attackers routinely breach seemingly secure organizations and steal... Read more »
Over the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works. Read more »
"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance. Read more »
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)². Read more »