For Innovators, a Drawback to Data Analytics

Number crunching can be valuable for firms exploiting their existing resources, but can backfire for companies seeking to branch out with new products or services. Read more »

Heartbleed Update: America the Vulnerable

More than 200,000 Internet-connected systems remain vulnerable to the OpenSSL vulnerability known as Heartbleed, more than two years after the flaw was publicly announced and related patches released, warns security researcher Billy... Read more »

Ukraine Sees Bank Heist, Organizations Crave Deception

Now a Ukraine bank has reported suffering a $10 million hacker heist via fraudulent SWIFT transfers. Also hear about why attackers often use legitimate IT administrator tools, and organizations' growing use of... Read more »

PCI-DSS Compliance: Are CEOs Buying In?

Ten years after the launch of the PCI Data Security Standards Council, the key to ensuring ongoing compliance with the PCI Data Security Standard is winning CEO buy-in worldwide, says Stephen Orfei,... Read more »

Anti-Virus Wars: Sophos vs. Cylance

Sophos Says Product Duel Was Rigged; Cylance Says NoEndpoint protection vendors compete fiercely for customers, and allegations of impropriety are common among rivals. The latest battle pits Sophos against Cylance. Whose version... Read more »

SWIFT Deduction: Assume You’ve Been Hacked

Ukrainian Bank Was Hacked in April, National Bank of Ukraine ConfirmsUkraine's central bank has confirmed that one of the country's banks fell victim to a fraudulent SWIFT heist in April. This latest... Read more »

Android Flaw Allows Full-Disk Crypto Bypass

57% of All Android Phones Vulnerable to Related ExploitsMore than half of all Android smartphones have a flaw that can be exploited to bypass the devices' full-disk encryption. As a result, law... Read more »

When Will Cyber Appellate Tribunal Chair be Named?

Post Remains Vacant; Fraud Cases PendingThe Government of India is yet to appoint a Cyber Appellate Tribunal chair - but powers and functions have been prescribed. Meanwhile, cases pile up, and critics... Read more »

Insider Threat: How Being ‘Noisy’ Can Reduce Fraud

Bank of the West's Pollino on Why Covert Monitoring Is the Wrong ApproachBank of the West's new approach to the insider threat is focused less on detection, more on preventing fraud in... Read more »

Shriram Life Responds to Alleged Server Hack

Denies Breach; Claims to Have Robust Security ControlsShriram Life Insurance responds to the recent alleged hacking of its servers by an unknown group of attackers. The company strongly denies any breach of... Read more »