Featured Articles from Cyber Security

DDoS attacks are exploding around the globe, with 73 percent of organizations admitting to having suffered a DDoS attack during the year acc…

11/3/2016

Businesses and governments are rushing to go digital. They want to find ways to make money and grow from the merging of mobility, big data, …

10/24/2016

Networks are evolving rapidly. The transformation to a digital business model has extended the network beyond the perimeter, which means tha…

9/26/2016

In the early days of DDoS attacks, the motivations and techniques were very different than they are today. When the first DDoS attacks were …

9/6/2016

MeriTalk is a public-private partnership dedicated to improving the outcomes of government IT. The company announced the result of its new r…

8/31/2016

What image springs to mind when you think about cybercrime? Some solitary hacker lurking in a dark, dank basement lit only by displays, madl…

8/22/2016

The World Energy Issues Monitor report states that the risk from cyber threats has increased, specifically in North America and Europe. Wher…

8/22/2016

Sometimes a problem lies lurking in the background, silently growing in scope and severity until it erupts in devastation. After the fact, p…

8/22/2016

The National Institute of Standards and Technology (NIST)confirms SMS is not secure for authentication.

8/17/2016

Tripwire survey at Black Hat finds most security experts believe cyber criminals are trying to influence U.S. presidential election.

8/16/2016

Gartner report says cyber security spending on the upswing in face of more frequent and sophisticated attacks but in selected areas.

8/15/2016

New evasive capabilities now target our most advanced defenses and hide the bad stuff in plain sight.

8/15/2016

Most people think that hacking happens in the dark corners of the Internet, but the reality is that popular mainstream sites are actually th…

8/11/2016

Flaw found in Microsoft Secure Boot that highlights that encryption backdoors can be compromised.

8/10/2016

Demisto cyberthreat playbook standard looks to make it easier to share incident response procedures.

8/9/2016

Testing for vulnerabilities in radio frequency (RF) networks, looking at Wi-Fi, digital mobile radio (DMR), DECT and Bluetooth devices and m…

8/4/2016

This is going to be short and sweet. Even though I write about online security, unfortunately almost around the clock given how fast and fur…

8/1/2016

Cisco just released its 2016 Midyear Cybersecurity Report (MCR) that, above all else, shows that businesses are not prepared for the current…

8/1/2016

This week in the Cyber Security Trend Community featured several of the community's best minds weighing in on what to do about the increasin…

7/30/2016

Efforts to devalue data will be the most impactful actions an organization can take to reduce the number, scope and impact of breaches.

7/29/2016

If brute force attacks are being automated to try millions of passwords in seconds, we need to combat this by also automating password rotat…

7/28/2016

It's no wonder CISOs and security teams are getting better and better at their jobs but sometimes question if their efficiency is missing th…

7/26/2016

Initiative of industry heavyweights aims to put a damper on companies being held hostage by online bad guys.

7/25/2016

How to stop HummingBad malware which is generating over $300,000 per month for the organization behind it.

7/25/2016

This week in the Cyber Security Trend Community featured more advice on steps that can be taken to increase one's security posture from atta…

7/23/2016

How organizations can protect themselves from growing and potentially crippling menace of large numbers of Android devices with C&C enabled.

7/19/2016

Organizations, in addition to alerts from security detection appliances, need automated tools that can correlate information from multiple s…

7/18/2016

The word tokenization is being used far too broadly to describe a variety of payment security methods that perform different functions.

7/18/2016

(ISC)² will recognize 35 honorees and announce four showcased workforce initiatives, at July 26, 2016 ceremony in Bangkok, Thailand

7/18/2016

This week in the Cyber Security Trend Community featured some interesting advice on several fronts for skilled IT security professionals to …

7/16/2016

Using observable behavioral biometrics gathers data that cannot be spoofed helps to prevent fraud.

7/13/2016

Engineers Ireland members now will have access to (ISC)² training and certifications through Cycubix.

7/11/2016

While prevention, detection and response are essential components of a security program; they don't completely address today's threat landsc…

7/11/2016

Following industry best practices will help organizations ensure that they have a thorough process to create fully compliant products.

7/11/2016

Cyber security is something we all need and can benefit from. Whether you are safeguarding your personal laptop or work computer, having tho…

7/9/2016

Steps to be taken to secure databases in order to mitigate the increase of database breaches.

7/5/2016

Perimeter defenses can protect against exfiltrations, but they don't address the structural vulnerabilities that ransomware readily exploits…

7/5/2016

Chairman, HIMSS Identity Management Task Force calls for mandates on multi-factor authentication to protect medical records.

7/5/2016

An experiment conducted by Bitglass reveals MDMs can expose the personal data of users for possible abuse.

6/28/2016

Michael Shaulov, Head of Mobility for Check Point explores a dangerous tool that cybercriminals can use against mobile devices, and how to p…

6/27/2016

Even security-savvy developers are turning to security providers to give them the encryption and data protection technologies they need.

6/27/2016

Report from Return Path shows that the average large company spends more than $3.7 million every year dealing with email-based phishing atta…

6/27/2016

This week in the Cyber Security Trend Community featured a series of items of concern for skilled IT security professionals to consider. Top…

6/25/2016

User Behavior Analytics (UBA) is the great new hope in IT security. It has potential to uncover "unknown unknowns" by catching those attacks…

6/22/2016

The new Huawei report, The Global Cyber Security Challenge-It is time for real progress in addressing supply chain risks, looks at the best …

6/22/2016

JFrog showcases Xray solution, a pre-production software visibility tool at DockerCon, address the security concerns of using container tech…

6/21/2016

Growth of FIDO Alliance certified solutions, which now includes Bluetooth,indicates what could be end of passwords for authentication.

6/21/2016

This week in the Cyber Security Trend Community featured a series of items of concern for skilled IT security professionals to consider. Top…

6/18/2016

Juniper Research points to cybercriminals targeting of mobile giving security pros opportunity to help improve their organization's security…

6/15/2016

RiskAnalytics finds an extensive fast flux network, Zbot, is as sophisticated as any commercial-grade cloud network.

6/15/2016

Putting NSA recommendations into practice to secure networks from prying eyes isn't hard, but takes persistence.

6/14/2016

The new SCADAShield 5.0 by CYBERBIT provides advanced security and operational continuity.

6/13/2016

This week, the Cyber Security Trend Community had a little bit of everything for IT security professionals to consider, ranging from tips on…

6/11/2016

Five tips on how to become a data scientist, a career where currently demand outweighs the supply.

6/9/2016

It is an interesting snap shot in time as well as a pointer on things readers should check on in terms of your organization's preparedness. …

6/9/2016

Hackers continue their assault on WhatsApp users with fake "Gold Version" link.

6/8/2016

BakerHostetler 2016 Data Security Incident Response Report identified human error as the leading cause of incidents.

6/6/2016

This week in the Cyber Security Trend Community is a good example of the broad expanse of subjects readers need to not only be aware of but …

6/4/2016

As members of the Cyber Security Trend Community are in many instances painfully aware, a host of activities performed in security operation…

6/1/2016

If we get private keys under control, we are inherently safer. This may seem logical, but may actually be a misguided ambition.

6/1/2016

The European Union's General Data Protection Regulations means all companies should be thinking about their data privacy and data protection…

5/31/2016

In the mobile world ransomware targets Android devices almost exclusively and three families with different ways of working have been identi…

5/31/2016

One of the great myths that the Cyber Security Trend Community debunks is the old saying that any news is good publicity. Clearly that can't…

5/28/2016

It should be noted that (ISC)² members are eligible for special discounted pricing and will be able to attend any of the ASIS events, includ…

5/25/2016

Despite being under increasing attack, UK IT departments say funding and lack of skilled pros are holding them back from improving security …

5/24/2016

MeriTalk survey of federal IT decision makers found 79 percent frustrated with the Federal Risk and Authorization Management Program (FedRAM…

5/24/2016

Infoblox survey shows that maintaining high levels of network security directly correlates with positive business outcomes.

5/23/2016

The Mobile Ecosystem Forum (MEF) has singled out 11 distinct fraud types that impact messaging throughout the world to raise awareness and c…

5/23/2016

Unfortunately as the headlines screamed all week from LinkedIn revealing the extent to which it had been compromised and a host of other hig…

5/21/2016

The Ponemon Institute Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data paints bleak picture.

5/18/2016

Attackers no longer have to breach the castle wall. Data-threat actors now target an organization's employees and customers directly.

5/17/2016

The state of the Security Information and Event Management (SIEM) market and parameters to consider before selecting a SIEM solution.

5/17/2016

ApacheCon North America, MIRACL, NTT Innovation Institute Inc., and NTT Labs contribute security and authentication code to Apache Milagro.

5/16/2016

As noted in the introduction we all are vulnerable to cyber attacks personally and professionally. And, when it comes to cyber security size…

5/14/2016

Given the indiscriminant nature of cyber threats, the need for small- to medium-sized businesses (SMBs) to have information and tools to war…

5/13/2016
Free Subscription