Report: Mercenaries Behind APT Attacks

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Report: Mercenaries Behind APT Attacks
'Espionage as a Service' Offers Governments Deniability By Mathew J. Schwartz, January 16, 2015. Credit Eligible   An increasing number of sophisticated cyber-attacks are not being launched by governments -...
Continue reading
0 Comments

Industry News: Symantec Works with Narus

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Industry News: Symantec Works with Narus
Also: Latest from Heartland Payment Systems, Websense, Sanovi By Megan Goldschmidt, January 16, 2015. Credit Eligible Symantec has entered an agreement with Narus, a Boeing subsidiary, to provide 65 engineers...
Continue reading
0 Comments

U.S., UK Plan 'Cyber War Games'

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Images of the seal of Muhammad and Islamic creed as seen on the ISIS flag.
Online Attacks Slam France After Paris Massacre By Mathew J. Schwartz, January 16, 2015. Images of the seal of Muhammad and Islamic creed as seen on the ISIS flag. The...
Continue reading
0 Comments

Results and perspectives from the 2015 Vormetric Insider Threat Report

Insider Threats now play a major role in almost all of the high profile data breaches being experienced globally. If a primary element in a breach wasn't a traditional insider,...
Continue reading
0 Comments

ATM: Attacking Multichannel Fraud

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Joerg Engelhardt, Nick Billett, Uwe Krause, Bernd Redecker and Owen Wild
Experts Explain Why Transactional Analytics Is Critical Credit Eligible Joerg Engelhardt, Nick Billett, Uwe Krause, Bernd Redecker and Owen Wild The increasing globalization of fraud perpetrated by sophisticated organized crime...
Continue reading
0 Comments

Banking Malware Poses New Threats

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Early Detection Is Critical for Fraud Prevention By Marco Morana, January 16, 2015. Malware banking threats are escalating in sophistication, and financial institutions and bank customers are at increased risk...
Continue reading
0 Comments

Google Reveals More Microsoft Zero Days

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Google Reveals More Microsoft Zero Days
Should All Flaws Get Fixed Within 90 Days? By Mathew J. Schwartz, January 21, 2015. Credit Eligible   After laying off an unspecified number of its testing-focused Windows and Office...
Continue reading
0 Comments

Fed's Debit Incentive for Banks Upheld

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Fed's Debit Incentive for Banks Upheld
Experts Debate Long-Term Impact of Supreme Court Decision Credit Eligible   The long-running legal battle over the Federal Reserve's debit interchange fee structure has ended now that the U.S. Supreme...
Continue reading
0 Comments

Obama to Congress: Enact Cybersecurity Laws

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
The White House video feed of the State of the Union address.
President Warns of a Nation Vulnerable Without New Statutes Credit Eligible The White House video feed of the State of the Union address. President Obama urged Congress in his State...
Continue reading
0 Comments

ENISA Warns of Internet Vulnerabilities

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
ENISA Warns of Internet Vulnerabilities
Calls for Adoption of Best-Practice Defenses By Mathew J. Schwartz, January 20, 2015. The Internet infrastructure remains susceptible to a variety of threats, including routing attacks, DNS spoofing and poisoning...
Continue reading
0 Comments

Why HIPAA Risk Assessments are Only the Tip of the Iceberg

HIPAA Risk Assessments are a valuable component of a healthcare organization's information security program. They fulfill a mandatory requirement of the HIPAA Security Rule, Omnibus Rule, and where applicable, the...
Continue reading
0 Comments

Mitigating Employee Risk - Keep Hires from Starting Fires

loading...

Mitigating Employee Risk - Keep Hires from Starting FiresWebinar. Original link
Continue reading
0 Comments

Cyber Security for Community Banks: Managing the Unique Challenges

At the CUNA Governmental Affairs Conference earlier this year, chairman Debbie Matz highlighted the fact that credit unions are increasingly becoming targets for cyber attacks. The same goes for community...
Continue reading
0 Comments

NIST Revises Crypto Standards Guide

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
NIST Revises Crypto Standards Guide
Revamp of Standards Development Process Closer to Completion Credit Eligible   Nearly a year after issuing a first draft, the National Institute of Standards and Technology has released a substantially...
Continue reading
0 Comments

Regin Espionage Malware: A Closer Look

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Regin Espionage Malware: A Closer Look
APT Analysis Reveals Simple Components By Mathew J. Schwartz, January 23, 2015. Credit Eligible   Security researchers at anti-virus vendor Kaspersky Lab have released more information about two of the...
Continue reading
0 Comments

Government Rolls Out Chip and PIN

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Government Rolls Out Chip and PIN
But Will Banks Be Influenced by the Strategy? Credit Eligible   As a result of President Obama's "Buy Secure" initiative, the federal government this month is kicking off its EMV...
Continue reading
0 Comments

Industry News: FireEye, ForgeRock Collaborate

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Industry News: FireEye, ForgeRock Collaborate
Also: Latest from Sophos, Bitglass, AGNITiO By Megan Goldschmidt, January 22, 2015. FireEye and ForgeRock have announced the integration of intelligence from the ForgeRock Identity Platform with the FireEye Threat...
Continue reading
0 Comments

Is Barack Obama a Cybersecurity Leader?

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
President Obama at the State of the Union. (White House photo)
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
President Busy Promoting His IT Security Initiatives President Obama at the State of the Union. (White House photo) The president of the United States is known as the leader of...
Continue reading
0 Comments

Barriers to Passing Federal Breach Notification Bill

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Barriers to Passing Federal Breach Notification Bill
Congressional Hearing Highlights the Difficulties Credit Eligible A House panel holds a hearing on national data breach notification law. Despite bipartisan rhetoric, comments from lawmakers and witnesses at a House...
Continue reading
0 Comments

FBI Issues Wire Transfer Scam Alert

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
FBI Issues Wire Transfer Scam Alert
Millions Lost in 'Business E-Mail Compromise' Scheme Credit Eligible   The FBI has issued an alert about a fraud scam known as "Business E-mail Compromise" targeting businesses that regularly make...
Continue reading
0 Comments