Latest Cybersecurity Articles

Password Protection: Software can secure and manage employees’ login credentials

Password Protection: Software can secure and manage employees’ login credentials

Apr 28, 2016

Despite the many news reports and employee security training that warn against doing so, one thing as sure as death and taxes is that computer…

Enterprises fall behind on protecting against phishing, detecting breaches

Enterprises fall behind on protecting against phishing, detecting breaches

Apr 26, 2016

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long…

Phishing emails leverage unique subject lines, Office docs

Phishing emails leverage unique subject lines, Office docs

Apr 26, 2016

Phishing emails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get…

CEO targeted by fraud twice a month

CEO targeted by fraud twice a month

Apr 19, 2016

Every couple of weeks or so, Tom Kemp’s company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money. It started…

New sensors help reduce supply chain risks

New sensors help reduce supply chain risks

Apr 13, 2016

Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption.According to a Capgemini Consulting…

Survey: Health care industry most targeted by cyberattackers

Survey: Health care industry most targeted by cyberattackers

Apr 13, 2016

According to a survey released this morning by 451 Research, 63 percent of health care industry respondents said they had experienced a breach, the highest…

Only a third of companies know how many vendors access their systems

Only a third of companies know how many vendors access their systems

Apr 12, 2016

The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Apr 12, 2016

Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Apr 12, 2016

Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…

Millions of child support records stolen, D.C. officials want answers

Millions of child support records stolen, D.C. officials want answers

Apr 8, 2016

In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked…

Is the blockchain good for security?

Is the blockchain good for security?

Apr 1, 2016

Overstock was one of the first online retailers to adopt Bitcoin in a big way. Now it’s become the first major company to issue stock…

Feds tackle open source code quality

Feds tackle open source code quality

Mar 31, 2016

Even as the White House is calling on federal agencies to make more use of open source projects, there’s also a federal effort under way…

Merging firms appealing targets for attackers

Merging firms appealing targets for attackers

Mar 30, 2016

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…

Top-Down Lockdown: Landing cybersecurity expertise on the board

Top-Down Lockdown: Landing cybersecurity expertise on the board

Mar 28, 2016

Many community banks understand that having technology expertise on their boards is a competitive advantage, not just to help with managing their technology but also…

Public concerned about security flaws in government open source code

Public concerned about security flaws in government open source code

Mar 24, 2016

Earlier this month, the White House released a draft of an open source code policy for public review which would require agencies to share code…

Report: Federal agencies still fighting the last war

Report: Federal agencies still fighting the last war

Mar 24, 2016

Federal government agencies are still fighting the last cybersecurity war, the one where computer networks had a strong, defensible perimeter, according to a new report…

FBI, Apple battle may leave lasting legacy

FBI, Apple battle may leave lasting legacy

Mar 23, 2016

The FBI may have backed off from its demand that Apple build a backdoor to an iPhone security mechanism, for now at least, but experts…

27% of US office workers would sell their passwords

27% of US office workers would sell their passwords

Mar 21, 2016

In a survey released today, 27 percent of of U.S. office workers at large companies would sell their work password to an outsider, compared to…

Sentry MBA makes credential stuffing attacks easy and cheap

Sentry MBA makes credential stuffing attacks easy and cheap

Mar 17, 2016

A new report released by Shape Security yesterday details how the Sentry MBA tool makes credential stuffing attacks more widely available to cybercriminals.The traditional “brute…

Business email compromise fraud rising fast, hard to fight

Business email compromise fraud rising fast, hard to fight

Mar 16, 2016

The email comes from a trusted source — the CEO, a regular vendor, the company attorney or accountant. It’s part of an ongoing conversation, the…

Why mobile data security matters

Why mobile data security matters

Mar 15, 2016

Keeping employees from using their personal mobile devices at work is a losing battle — and it’s challenging agencies to come up with new ways…

FTC orders nine PCI auditors to share assessment details

FTC orders nine PCI auditors to share assessment details

Mar 10, 2016

The FTC is on a data breach enforcement roll. Last summer, the courts allowed it to fine companies with weak cybersecurity practices. Now, the FTC…

Cybersecurity no longer merger afterthought

Cybersecurity no longer merger afterthought

Mar 3, 2016

As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped.”When you look…

Next-generation endpoint security tools ready to replace antivirus

Next-generation endpoint security tools ready to replace antivirus

Mar 2, 2016

The market for next-generation endpoint security tools has doubled each of the last two years, and will continue to grow at a compound annual growth…

Report: Web gateways fail to stop malicious outbound communications

Report: Web gateways fail to stop malicious outbound communications

Mar 2, 2016

In a recent study of a million client devices over the course of 10 months in 2015, every web gateway allowed outbound malicious communications –…

Cybercriminals face hacker talent shortage

Cybercriminals face hacker talent shortage

Mar 1, 2016

Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this…

Firms expect greater government cybersecurity oversight

Firms expect greater government cybersecurity oversight

Mar 1, 2016

The U.S. Senate recently proposed a cybersecurity disclosure bill that would require public companies to describe what cybersecurity expertise their boards have, or, if they…

Verizon releases first-ever data breach digest with security case studies

Verizon releases first-ever data breach digest with security case studies

Mar 1, 2016

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study. The…

Report: Compliance biggest driver of encryption

Report: Compliance biggest driver of encryption

Feb 29, 2016

The biggest driver of encryption technology is the need to comply with privacy or data security regulations, according to a new report.In a survey of…

Firms detect breaches sooner, but attackers have gotten nastier

Firms detect breaches sooner, but attackers have gotten nastier

Feb 25, 2016

Firms are detecting breaches nearly 30 percent sooner than before, according to a new report from Mandiant, but attackers are also getting more aggressive in…