The moment a successful defense is deployed, attackers find new ways to break into networks. In this video interview, Dr. Dale Meyerrose describes the damage wreaked by APTs and the strategies organizations can use to keep attackers at bay.
Discussions I recently moderated around mobile security indicate that Indian practitioners have significant doubts about the effectiveness and applicability of mobile security solutions such as MDM and others.
As U.S. merchants shore up physical point-of-sale security by upgrading their terminals to accept EMV chip cards, attackers are turning their aim toward new, unattended targets. Here's the latest on how to respond to "shimming" attacks.
The massive cyberattacks that struck Chase and other leading U.S. financial services firms illustrate just how vulnerable larger institutions can be to cyber-attacks. They also show why organizations must encrypt customer data, says security and forensics expert Chuck Easttom.
Home Minister Rajnath Singh says India is increasingly susceptible to international cyberattacks, and new barriers must be created. He also asks cybersecurity experts to be alert to online radicalization.
Banks need to prepare for many more massive cyberattacks along the lines of the sophisticated campaign that hit JPMorgan Chase and other financial services organizations, says Javelin Strategy & Research's Al Pascual, who offers risk management insights.
India's cybersecurity co-ordinator, Dr Gulshan Rai, finds the cyber world becoming more complex with growth in interconnected devices and emphasizes a multi-stakeholder approach in building a cybersecure nation.
The group of hackers who recently claimed to have hacked the CIA director's personal email account now says it has breached an FBI information-sharing portal. So far, the group has released contact information for about 2,400 law enforcement users.
Distributed-denial-of-service attacks on banks are more powerful than ever, but we hear less about them than we did three years ago. How have attackers changed their tactics, and why should we be even more concerned about their strikes?
To adequately protect their data, organizations need to go far beyond traditional controls and implement a "data-centric security" approach, says Informatica's Robert Shields, who describes the essential elements of the strategy.
In a video interview, Bob Carr of Heartland Payment Systems offers a frank assessment of missteps in the wake of the processor's landmark 2008 data breach, and he calls for widespread use of end-to-end encryption.
With growing risks of data breaches, Indian security leaders say it is critical to bring the new dangers of unreported breaches to the notice of practitioners at large. What will it take to spur such action?