Nine compelling threats will make securing IT more challenging than ever over the next two years, says Steve Durbin, managing director of the Information Security Forum. Read more »
"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance. Read more »
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)². Read more »
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses. Read more »
Attackers Skilled at Disguising 'Repeat Offenders'Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry... Read more »
Get Your Security Fundamentals Right, For StartersAfter the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of... Read more »
How the Movie Studio Fumbled Its Hack-Attack ReactionThe response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to... Read more »
Sony's Experience Suggests Poor Attention To DetailThe latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony... Read more »
Employee Posted Some Client Information OnlineFinancial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of... Read more »
Critics Fear Move Would Increase FraudThe Reserve Bank of India is considering removal of its two-factor authentication requirement for small-value transactions. The goal: to facilitate easier transactions. But security experts fear the... Read more »