Buoyed by massive illicit profits, cybercriminals have continued to refine their ransomware attacks, including updating their crypto techniques to foil decryption tools, encrypting file names and threatening to leak stolen secrets.
To adequately protect their data, organizations need to go far beyond traditional controls and implement a "data-centric security" approach, says Informatica's Robert Shields, who describes the essential elements of the strategy.
The National Institute of Standards and Technology has issued a Guide to Application Whitelisting that provides step-by-step instructions on deploying automated application whitelisting to help prevent malware from accessing IT systems.
The quantity and duration of distributed denial-of-service attacks continue to increase. The latest attacks are being launched via MySQL servers infected with Chikdos malware, as well as compromised Internet-connected CCTV systems, researchers say.
Brijesh Singh, CISO for the state of Maharashtra and IG of CID, says that the threat is evolving in such a manner that it is impossible for law enforcement alone to tackle it. "All of our traditional models of policing, they don't work here."
Symantec new Advanced Threat Protection solution aims at consolidating its key security offerings to enable organizations to remediate advanced threats effectively. Symantec's Kaura shares details, strategy in an interview.
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
Security may be doomed to remain misunderstood and perceived as a business hurdle if it continues to speak technology. Security needs to speak the language of risk to the business, argues Dr. Siva Subramaniam, Global CISO Bharti Airtel.
A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.
While sophisticated cyberattacks and high-profile mega-breaches get most of the attention, European fraud experts say less sophisticated attacks are far more common and pose a greater fraud risk. At ISMG's Fraud Summit in London, they called for global collaboration to fight fraud.
(ISC)Â² 's recent global workforce study finds the number of Infosec women as a percent in GRC roles has doubled. Female security practitioners endorse the view, saying women, by nature, are better risk managers.
Cloud Access Security Brokers are the flavor of the season in cloud security. The value proposition is immense - enabling the enterprise to extend and enforce policies beyond the perimeter effectively. Let's take a closer look.
HP has agreed to sell its intrusion detection and prevention software unit TippingPoint to security vendor Trend Micro for $300 million. But analysts say Trend Micro faces stiff breach detection and incident response competition.