Password Protection: Software can secure and manage employees’ login credentials
Despite the many news reports and employee security training that warn against doing so, one thing as sure as death and taxes is that computer…
Enterprises fall behind on protecting against phishing, detecting breaches
The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long…
Phishing emails leverage unique subject lines, Office docs
Phishing emails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get…
CEO targeted by fraud twice a month
Every couple of weeks or so, Tom Kemp’s company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money. It started…
New sensors help reduce supply chain risks
Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption.According to a Capgemini Consulting…
Survey: Health care industry most targeted by cyberattackers
According to a survey released this morning by 451 Research, 63 percent of health care industry respondents said they had experienced a breach, the highest…
Only a third of companies know how many vendors access their systems
The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…
Symantec: Zero-days doubled in 2015, more companies hiding breach data
Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…
Symantec: Zero-days doubled in 2015, more companies hiding breach data
Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…
Millions of child support records stolen, D.C. officials want answers
In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked…
Is the blockchain good for security?
Overstock was one of the first online retailers to adopt Bitcoin in a big way. Now it’s become the first major company to issue stock…
Feds tackle open source code quality
Even as the White House is calling on federal agencies to make more use of open source projects, there’s also a federal effort under way…
Merging firms appealing targets for attackers
Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…
Top-Down Lockdown: Landing cybersecurity expertise on the board
Many community banks understand that having technology expertise on their boards is a competitive advantage, not just to help with managing their technology but also…
Public concerned about security flaws in government open source code
Earlier this month, the White House released a draft of an open source code policy for public review which would require agencies to share code…
Report: Federal agencies still fighting the last war
Federal government agencies are still fighting the last cybersecurity war, the one where computer networks had a strong, defensible perimeter, according to a new report…
FBI, Apple battle may leave lasting legacy
The FBI may have backed off from its demand that Apple build a backdoor to an iPhone security mechanism, for now at least, but experts…
27% of US office workers would sell their passwords
In a survey released today, 27 percent of of U.S. office workers at large companies would sell their work password to an outsider, compared to…
Sentry MBA makes credential stuffing attacks easy and cheap
A new report released by Shape Security yesterday details how the Sentry MBA tool makes credential stuffing attacks more widely available to cybercriminals.The traditional “brute…
Business email compromise fraud rising fast, hard to fight
The email comes from a trusted source — the CEO, a regular vendor, the company attorney or accountant. It’s part of an ongoing conversation, the…
Why mobile data security matters
Keeping employees from using their personal mobile devices at work is a losing battle — and it’s challenging agencies to come up with new ways…
FTC orders nine PCI auditors to share assessment details
The FTC is on a data breach enforcement roll. Last summer, the courts allowed it to fine companies with weak cybersecurity practices. Now, the FTC…
Cybersecurity no longer merger afterthought
As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped.”When you look…
Next-generation endpoint security tools ready to replace antivirus
The market for next-generation endpoint security tools has doubled each of the last two years, and will continue to grow at a compound annual growth…
Report: Web gateways fail to stop malicious outbound communications
In a recent study of a million client devices over the course of 10 months in 2015, every web gateway allowed outbound malicious communications –…
Cybercriminals face hacker talent shortage
Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this…
Firms expect greater government cybersecurity oversight
The U.S. Senate recently proposed a cybersecurity disclosure bill that would require public companies to describe what cybersecurity expertise their boards have, or, if they…
Verizon releases first-ever data breach digest with security case studies
Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study. The…
Report: Compliance biggest driver of encryption
The biggest driver of encryption technology is the need to comply with privacy or data security regulations, according to a new report.In a survey of…
Firms detect breaches sooner, but attackers have gotten nastier
Firms are detecting breaches nearly 30 percent sooner than before, according to a new report from Mandiant, but attackers are also getting more aggressive in…