Fighting back against the ransomware epidemic requires making sure that a wide variety of best practices for security hygiene are in place, says Mohit Puri of security vendor Sophos Technologies, who spells out essential steps.
Nearly three years after the Heartbleed bug - and 600,000 vulnerable servers - was discovered, the vulnerability lives on. The latest scans still count 180,000 at-risk servers. Why won't this bug just die?
President Trump is reportedly preparing to issue an executive order calling for a review of the nation's cybersecurity capabilities and vulnerabilities. The pending report outlines a series of steps to be taken within 60 days of the signing of the order.
Gartner analyst Avivah Litan has long been the go-to expert for insights on fraud detection. Now she has broadened her focus to cover endpoint security and user and entity behavioral analytics. Where do these topics converge, and what insights can she share on the 2017 cybersecurity outlook?
This edition of the ISMG Security Report leads with news that several senior White House staffers had been using a private email server. Also, fueled by worries over Russian hacking, the Australian government plans to educate political parties on improving cybersecurity.
The subscription-based breach notification service LeakedSource appears to have gone dry. Security expert Troy Hunt says the privacy writing has been on the wall for the site, owing to it selling access to stolen personal data.
An overlooked security setting on Twitter may have allowed a hacker to guess the password-reset email addresses tied to accounts used by President Donald Trump, first lady Melania Trump, Vice President Mike Pence plus a top adviser. What's the risk?
Russian authorities have reportedly arrested a top computer security official at the Federal Security Service as well as a head Kaspersky Lab investigator on treason charges, alleging that they received money from "foreign organizations."
Microsoft does not have to turn over emails stored outside the U.S. to federal authorities investigating a crime, an appeals court has affirmed. The closely watched case, which explored the territorial boundaries of U.S. law in the cloud computing age, could end up at the Supreme Court.
Australia's federal government is planning to brief the country's political parties next month on cybersecurity threats, a move fueled by worries its electoral process could be targeted by a foreign power.
This ISMG Security Report leads with comments from President Donald Trump that suggest the U.S. military will take the lead in defending civilian-owned critical infrastructure. Also, how insider defenses changed since Chelsea Manning's WikiLeaks data dump.
RSA Conference 2017 is coming to San Francisco from Feb. 13 to 17. What new sessions, speakers and venues should attendees expect to see? Conference organizers Linda Gray Martin and Britta Glade offer a preview.
U.S. authorities are reportedly investigating whether Yahoo should have notified investors faster about two separate data breaches that it suffered in 2013 and 2014. Until last year, one breach remained undetected and the full severity of the other was not understood.
Four years after a messy legal battle sparked by Edward Snowden using its service, the secure email provider Lavabit is back with a new platform designed to provide better privacy protection - users can select from "trustful," "cautious" or "paranoid" modes - by encrypting both email content and metadata.
In his eight years in the White House, former President Barack Obama made cybersecurity a priority. But will his legacy be his administration's various IT security initiatives or the damaging breaches that occurred during his tenure? That's the lead story in the latest edition of the ISMG Security Report.