Hackers have been plugging inexpensive hardware into banks' local area networks to help perpetrate heists that have stolen tens of millions of dollars, warns Kaspersky Lab. It says that since 2017, the "DarkVishnya" attack campaign has hit at least eight Eastern European banks.
The sheer volume of data justifies the need for analytics software. It isn't realistic to expect human analysts to visually examine multiple streams of video data in real time. In addition to efficient storage and retrieval processes, police departments need sophisticated video analytics to sort through the footage...
Retired Brigadier General Gregory Touhill, the first CISO of the federal government, spells out what he sees as the essential steps for fighting against Russian meddling in this year's midterm elections. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...
On the eve of Europe's biggest annual cybersecurity conference, and scores of interviews with some of the world's leading information security experts, I'm asking how the London Bridge attacks will change the tenor of at least some of these discussions.
How Prepared Is Your Organization to Defend Against Today's Advanced Threats?
Ashley Madison, Sony, JPMorgan Chase - what's your confidence that when the next big security incident erupts, your organization will be prepared to defend itself? Are you getting the security you expect from the investment your...
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.