Report: Here's How Attackers Borrow Administrative Tools to Force EntryWhile malware may be used for an initial attack, hackers quickly begin using tools to move around networks that often don't raise suspicion.... Read more »
CISO Richard Starnes on Building a Solid Relationship with InvestigatorsIn a breach investigation, there can be natural tension between security leaders and law enforcement. Richard Starnes has played both roles, and in... Read more »
Some Companies Choose to Risk Fines Rather Than ComplyWhile PCI compliance is a priority for many U.S. retailers, some major companies in Australia say they'd rather forego the cost of compliance and... Read more »
The Unsettling Tale of How 'The Dark Lord' Shakes Down TargetsAn individual claiming to be the hacker who posted four healthcare databases on the dark web reveals some of his tactics. We... Read more »
'Child ID Kits' Carry Identity Theft Risks, Experts WarnWarning to parents and guardians: Beware of collecting, storing or sharing your child's biometric information - including fingerprints and DNA - even if you're... Read more »
But Legislative Group Hug Won't Change Encryption FactsWould access to better information pertaining to encryption help Congress pass good crypto-related laws? That's the impetus behind a "Digital Security Commission" and a related... Read more »