The National Institute of Standards and Technology has issued a Guide to Application Whitelisting that provides step-by-step instructions on deploying automated application whitelisting to help prevent malware from accessing IT systems.
In a video interview, Bob Carr of Heartland Payment Systems offers a frank assessment of missteps in the wake of the processor's landmark 2008 data breach, and he calls for widespread use of end-to-end encryption.
To avoid having their organizations exploited by teenage hackers, boards of directors worldwide need to get serious about security. Here are five lessons to be learned from the latest TalkTalk data breach.
The quantity and duration of distributed denial-of-service attacks continue to increase. The latest attacks are being launched via MySQL servers infected with Chikdos malware, as well as compromised Internet-connected CCTV systems, researchers say.
Tinba, which has been linked to attacks in the U.S., Canada and Europe, is now targeting bank accounts in Russia, according to a new report from Dell SecureWorks. Researcher Brett Stone-Gross tells why Tinba is unusual and can be tough to detect.
Developing a successful information security career requires excellent technical acumen as well as the ability to understand the impact that security policies have on people, says Gurdeep Kaur, a chief security architect at AIG.
Brijesh Singh, CISO for the state of Maharashtra and IG of CID, says that the threat is evolving in such a manner that it is impossible for law enforcement alone to tackle it. "All of our traditional models of policing, they don't work here."
Symantec new Advanced Threat Protection solution aims at consolidating its key security offerings to enable organizations to remediate advanced threats effectively. Symantec's Kaura shares details, strategy in an interview.
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
In this video interview, Mike Weber of Coalfire Labs discusses ways that healthcare organizations can develop strategies for easily sharing patient data among clinical professionals using a variety of devices while protecting that data from attackers.
British police have arrested a third suspect in connection with the hack attack against telecommunications provider TalkTalk. Separately, Vodafone UK also issued an alert of a breach, which it traced to reused passwords.
Security may be doomed to remain misunderstood and perceived as a business hurdle if it continues to speak technology. Security needs to speak the language of risk to the business, argues Dr. Siva Subramaniam, Global CISO Bharti Airtel.
A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.
Many CEOs and boards of directors are failing their companies by not truly understanding their cybersecurity risks, says Steve Durbin of the Information Security Forum. He stresses that senior leaders must ensure their organizations provide adequate funding to manage risks.