While PCI DSS compliance is an important piece of the security checklist, it's not enough to protect retailers from sophisticated Cyber-attacks that fall outside of the cardholder data environment (CDE).
A PCI compliance audit is a little like making sure a lock is on your front door - but it doesn't guarantee...
Seven state insurance commissioners conclude in a new in-depth report that the massive cyberattack on Anthem Inc. was carried out by a hacker on behalf of a nation-state. But they stop short of naming the nation involved or penalizing Anthem for the breach that affected 80 million.
Security experts have seen a doubling in less than a day of successful attacks against insecure MongoDB databases in attempts to extract ransoms from their owners. What's the fix?
Because cyberattackers are now using memory-resident malware that leave no trace on the disk, forensics experts using traditional methods will face a challenge, says Christopher Novak, director of Verizon's global investigative response unit.
President-elect Donald Trump reportedly now accepts the U.S. intelligence community's assessment that Russia attempted to meddle in U.S. elections and may take action in response once he takes power, an aide says.
In an unclassified version of a top-secret report, the U.S. intelligence community says that Russian President Vladimir Putin ordered an influence campaign aimed at undermining public faith in America's democratic process and preventing Hillary Clinton from being elected president.
The KillDisk disk-wiping malware, previously tied to espionage operations, has been updated with crypto-locking capabilities and now targets Linux as well as Windows systems. But security experts warn that attackers using the Linux variant have no way to furnish a decryption key.
Rajendra Pawar, chairman of NASSCOM's Cyber Security Taskforce, discusses how to build India as a global cybersecurity hub and develop a skilled workforce. He describes his vision for the next five years
To deal with the risks posed by the explosive growth of the internet of things, CISOs and CIOs must expand the scope of their security efforts, says Ganesh Ramamoorthy, vice president of research at Gartner.
Hackers have apparently hijacked potentially thousands of vulnerable MongoDB databases and demanded ransoms for the return of critical data, with some victims paying up, according to security researchers.
A task force led by two lawmakers and a former U.S. CIO recommends the new administration should jettison outdated ways the federal government tackles cybersecurity, saying in a just-issued report: "Once-powerful ideas have been transformed into clichés."
The lack of a smoking gun - absolute certainty - has some security experts not entirely convinced that the Russians or their backers hacked Democratic Party computers in an attempt to sway the U.S. presidential election.
In this ebook, 33 security experts were asked how they communicate security program effectiveness to business executives and the Board. They share their recommendations and best practices.
If you're a security professional, you'll find their insights indispensable for helping you better communicate with business...
The Definitive Guide to Continuous Network Monitoring will give you the foundational knowledge you need for building a continuous network monitoring program in your organization. You'll learn why so many enterprises are abandoning periodic monitoring in favor of new methods for continuously identifying risks,...
Advanced threats are multi-layered and borderless - and so are today's enterprises. These are among the factors pushing organizations to adopt the Intelligent Hybrid Security approach, says Anil Nandigam of NSFOCUS.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.