Distributed healthcare networks have grown in complexity over the last decade as they expand network access and add more sophisticated security technologies to protect their networks. In addition, the adoption of standards such as the Payment Card Industry Data Security Standard (PCI DSS) and HIPAA have also improved...
In November and December of 2013, Cybercriminals successfully collected, staged and ultimately exfiltrated "Track 1 and 2" data related to millions of debit and credit cards. While many details remain unclear, quite a few have emerged. There has been a lot of speculation about what security products Target Corporation...
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Solutionary is out with its quarterly threat intelligence report. Topping the list: the exploitability of the Heartbleed bug, and the current malware trends. Rob Kraus teases the report's highlights.
No single security solution is enough to defend against today's multifaceted exploits. So it's time for a new holistic and cooperative approach to information security, says Bob Hansmann of Websense.
Expect every new warning of cybercrime attacks, online espionage or the malware du jour to be slickly marketed, with the announcements carefully timed. But is this bad for either the information security community or attackers' victims?
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
The Obama administration urges Congress to update U.S. anti-hacking laws to crack down on fraudsters operating abroad, disrupt spam and DDoS botnets, and arrest "botnet for hire" service providers.
The world may move at Internet speed, but the IT security and risk management challenges organizations face seem to be tackled at a much slower pace. Hard to believe, right?
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
Despite recent high-profile breaches, organizations are not buying cyber-insurance policies at explosive rates. But Gartner's cyber-insurance expert Juergen Weiss says that might not be a bad thing.
Does BYOD really stand for Bring Your Own Disaster? JD Sherry of Trend Micro discusses the latest mobile security trends and threats, including the evolution of ransomware and the Internet of Things.
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
Law enforcement agencies worldwide took part in a coordinated operation to disrupt the Gameover Zeus botnet and seize computer servers crucial to the CryptoLocker ransomware. A Russian citizen has been indicted in connection with the crackdown.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.