Equation Group Stings Firewall Vendors with Zero-Day Flaws

Has the US Long Known About the Vulnerabilities?The Equation Group leak revealed a zero-day flaw in Cisco's firewall software - a patch is being prepped - as well as a vulnerability in... Read more »

Finding the Right Authentication Approach

NICE Actimize's Mary Ann Miller on Banks' Emerging StrategiesBanks need to develop customer authentication strategies that meet demand for strong security as well as convenience, says Mary Ann Miller of NICE Actimize,... Read more »

Confirmed: Leaked Equation Group Hacking Tools Are Real

Dump May Reveal Russian, US Intelligence Agencies Openly Squaring OffScant doubt remains that a set of code and exploits - leaked by the "Shadow Brokers" hacking group - belongs to the Equation... Read more »

Unraveling the Mystery Behind the Equation Group

Hear ISMG editors untangle the various elements in the Shadow Brokers-Equation Group saga, evaluate a new anti-ransomware tool and reflect on the 10th anniversary of the PCI Security Standards Council in this... Read more »

Building a Better Defence

As new schemes from hackers get more disruptive and harmful, it is critical to scale up defences, disrupt these attacks and make your organization a lesser target. Alex Holden, founder and CISO... Read more »

Using Cybernetics to Tell the Security Story

Sam Lodhi, CISO of UK's Medicine and Health Products Regulatory Agency, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other... Read more »

When a DDoS Attack Isn’t a DDoS Attack

A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy... Read more »

Report: SWIFT Screwed Up

Before Bangladesh Bank Heist, SWIFT Allegedly Overlooked Smaller Banks' SecuritySWIFT screwed up. That's the takeaway from a new report into the Brussels-based cooperative, which alleges that the organization overlooked serious concerns relating... Read more »

Retooled Locky Ransomware Pummels Healthcare Sector

Attackers Increasingly Favor Ransomware Over Banking Trojans, FireEye SaysCybercriminals wielding Locky crypto-locking ransomware are ramping up their assaults, especially in the healthcare sector, according to FireEye. Attackers are distributing less ... Read more »

Inbox Zero: Can Employees Be Persuaded to Abandon Email?

The rise of Web 2.0 platforms and social media programs has the potential to enhance the way colleagues collaborate, but old work habits die hard. Read more »