Automated mitigation on endpoint devices and networks can be tricky
Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and…
Security automation is maturing, but many firms not ready for adoption
The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies…
How the insurance industry could change the game for security
The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if…
Latest OWASP Top 10 looks at APIs, web apps
The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of…
Cyberespionage, ransomware big gainers in new Verizon breach report
Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases…
Cybersecurity industry braces for tighter visa rules
The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest…
Most employees willing to share sensitive information, survey says
According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector,…
Report: Cybercriminals prefer Skype, Jabber, and ICQ
The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning.Meanwhile, consumer-grade platforms like…
What it takes to become a data security strategist
By the time John Kronick became a data security strategist a few years ago, he’d already been in the security industry for 20 years. But…
InfoSec pros feel less external pressure, take security more personally
Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a…
Rollback of FCC privacy requirements could have broad repercussions
Last week’s roll-back of FCC privacy regulations was good news for ISPs and marketers and bad news for privacy advocates. But the decision could also…
What it takes to become a security systems administrator
download What it takes to become a security systems administrator CSO To read this article in full or to leave a comment, please click here(Insider…
Report: 30% of malware is zero-day, missed by legacy antivirus
At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report
Don’t pay ransoms. But if you must, here’s where to buy the Bitcoins
Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy.Avoiding becoming part…
After Amazon outage, HealthExpense worries about cloud lock-in
Financial services companies as popular targets of cybercriminals for the obvious reason — they’re where the money’s at. And health care companies have medical records,…
Expert: NY breach report highlights third-party risk
New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.”In…
Bitcoin rise fuels social media scams
The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get…
Danes targeted by malware spread through Dropbox
Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack. According to a…
AI isn’t just for the good guys anymore
Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the…
Experts split on how soon quantum computing is coming, but say we should start preparing now
Whether quantum computing promises to make current encryption methods obsolete.
Hackers get around AI with flooding, poisoning and social engineering
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better,…
EMV migration delay doesn’t let gas stations completely off the hook
Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t…
Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower
Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by…
Security pros most worried about clouds, mobile
Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning.Around 60…
AI is coming, and will take some jobs, but no need to worry
The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…
Scholars, infosec experts call for action on Russian hacking
In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…
Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it
In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually…
SIEMs-as-a-service addresses needs of small, midsize enterprises
The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…
Report: Most cybercriminals earn $1,000 to $3,000 a month
Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…
Ransomware victims able to thwart attacks, report says
The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files,…