Navy Red-Team Testing Moves to Business

EdgeWave's Mike Walls, a former bomber pilot who led Navy red teams, says penetration testing is useful in analyzing bits and bytes but not the readiness of operations under attack from cyberspace.... Read more »

Inside the Inception APT Campaign

Christophe Birkeland, CTO of malware analysis for Blue Coat Systems, was part of the team that discovered the Russia-targeting Inception campaign, and says the hunt for new APT attacks remains ongoing. Read more »

EU Police Arrest Suspected Phishers

Cross-Border Cybercrime Gang Tied to $6.7 Million in FraudAn international police effort dubbed "Operation Triangle" has resulted in the arrest of 49 suspected members of a cybercrime group accused of launching phishing... Read more »

White House, Apple Advance HTTPS

But Experts Question Government's Security PrioritiesEncrypted browsing - using HTTPS - helps secure online communications, and Apple says developers must now employ the protocol by default. Likewise, the White House says that... Read more »

Syrians Claim U.S. Army Website Hack

Army Takes Site Offline After Apparent CDN BreachThe Syrian Electronic Army claims credit for defacing the U.S. Army's public-facing website with propaganda. Following the June 8 hack, the Army took the website... Read more »

Breach Responders Get Proactive

Organizations are getting increasingly prioritizing incident response capabilities by putting investigation firms on retainer, or creating their own internal teams, says Patrick Morley, president and CEO of Bit9 + Carbon Black. Read more »

Cybersecurity: Rebuilding U.S.-EU Trust

Two years after the leaks that showed the U.S. National Security Agency spied on America's European allies, the U.S. and Europe still need to rebuild trust so they can collaborate on defending... Read more »

DDoS Attacks Continue to Evolve

Attackers today continue to refine their distributed denial-of-service attack capabilities, delivering downtime on demand. The increase in attack effectiveness and volume demands new types of defenses, says Akamai's Richard Meeus. Read more »

Seeking Faster Data Breach Response

Last year, organizations took an average of 205 days to detect a breach. To better combat such attacks and lock down breaches, FireEye's Jason Steer says organizations must lower that to hours... Read more »

Ola Cabs Hack: An Analysis

Security Experts Weigh in on Latest DisclosureThe alleged hack on Ola Cabs comes just months after AppSec experts called out Ola's Mobile app for security lapses. We take a closer look at... Read more »