What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common? Researchers say the answer is shockingly simple.
Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
In the wake of the APT30 report's revelations, FireEye's Ranndeep Chonker talks about the Indian government's approach to information security and its primary challenges in dealing with APT types of attacks.
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
A new report says the Department of Health and Human Services has several security weaknesses that may have contributed to five recent data breaches. But are other healthcare entities guilty of the same mistakes?
Given that hacking is an everyday threat to most organizations, reliable security depends on understanding the exposure, weaknesses and threats that could lead to a breach in the defences, says PWC's Wouter Veugelen.
Carphone Warehouse, a U.K.-based mobile phone retailer, is investigating a cyber-attack that may have breached personal information associated with up to 2.4 million customers, and card data linked to 90,000 accounts.
Neiman Marcus has asked a federal court to reconsider its decision to allow a consumer class-action suit to go to trial. If the retailer fails, legal experts say, it could mean a costly setback for breached entities.
Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.
The Black Hat conference features presentations that have already led to very public warnings about remotely hackable flaws in everything from Jeep Cherokees and Linux-powered rifles to Android mobile devices and Mac OS X.