Cybercrooks fight over DDoS attack resources
As more groups get into the denial-of-service attack business they’re starting to get in each other’s way
Ad network takes steps to reduce fraud
The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent…
Report: Average ransomware demand now over $1,000
The average amount of a ransomware demand has increased from $294 in 2015 to $1,077 last year, according to a report released last week by…
Automated mitigation on endpoint devices and networks can be tricky
Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and…
Security automation is maturing, but many firms not ready for adoption
The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies…
How the insurance industry could change the game for security
The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if…
Latest OWASP Top 10 looks at APIs, web apps
The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of…
Cyberespionage, ransomware big gainers in new Verizon breach report
Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases…
Cybersecurity industry braces for tighter visa rules
The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest…
Most employees willing to share sensitive information, survey says
According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector,…
Report: Cybercriminals prefer Skype, Jabber, and ICQ
The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning.Meanwhile, consumer-grade platforms like…
What it takes to become a data security strategist
By the time John Kronick became a data security strategist a few years ago, he’d already been in the security industry for 20 years. But…
Hackers get around AI with flooding, poisoning and social engineering
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better,…
Deception technology grows and evolves
Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…
Why Linux is a desktop flop
It’s free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than Windows. It’s already…
Vendors Releasing Same Software on Parallel Tracks
Dual software releases–one open-source and one commercial–can mean savings and security for buyers.
Five 3D virtual environments for the enterprise
Several companies are offering business-friendly virtual meeting platforms that work right in a Web browser, no software download required, with prices starting at around $50…
Companies Explore Private Virtual Worlds
Alternatives to Second Life provide security while boosting productivity Meetings, conferences and training programs in a 3D virtual world such as Second Life can be…
iPads storm the enterprise
Apple’s new application-level encryption paves the way for companies to run business apps on the iPad
Five iPad Safety Tips
1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks,…
OppenheimerFunds Gets Return on Investment from Agile and SOA
OppenheimerFunds used to have a data entry efficiency problem. Address changes that customers made on its website had to be manually re-entered into a variety…
Open Source – China’s Bet on Linux
As China prepares to become a full member of the World Trade Organization, the Beijing government is trying to prove to the West that it…