Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
U.S. banks and credit unions suing Target for reimbursement of costs associated with its massive 2013 data breach want a court to force the retailer to disclose more details about its breach and security practices.
Planned Parenthood has reportedly notified the FBI and Department of Justice of an apparent hack attack against the organization. An anti-abortion group that calls itself 3301 is taking credit for the hack.
Gene Fay of Resilient Systems says the traditional method of solving risk issues through technologies no longer works. Instead, he says, security must be built on the foundation of an effective incident response plan.
RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
Amit Yoran, president of RSA, says Asian organizations must re-think their approach to security. He outlines five key steps to building a resilient cyber defense mechanism. But how do security leaders respond?
Put your personal feelings aside; what's dangerous about the AshleyMadison.com breach is that ideologists will now go beyond taking down an IT system and actually destroy a business. This evolution, says cybersecurity expert Carl Herberger, requires a new way to assess and mitigate risk.
The Ashley Madison dating website hack and threatened data release is a perfect illustration of the perils - and promise - of our Internet-connected, hacktivist age, whether it comes to online dating or the Internet of Things.
Enterprises in APAC are prone to greater risks because of a lack of awareness about advanced threats, says BH Global CIO Ken Soh. He shares insights on how to prepare incident response teams to combat threats.
The U.S. Department of Justice has charged three men in a fraud scheme reportedly tied to hacks of JPMorgan Chase. Separately, two men are charged with running an unlicensed online bitcoin exchange used by Russian criminals.
The hack of "cheating" dating site AshleyMadison.com is a reminder that no website or personal information can be guaranteed to remain secure against determined attackers. So businesses and consumers must plan accordingly. Here are six takeaways from the incident.
The risks of e-commerce breaches are top-of-mind again with the news of a possible compromise of PNI Digital Media, which manages and hosts online photo services for numerous big-name retailers. How can the risks be mitigated?