The Latest News

  • IRS Authentication Method Criticized

    Breach Probe Widens; Russian Gangs Suspected IRS Authentication Method Criticized

    The method the Internal Revenue Service used to authenticate users, which failed to keep sophisticated hackers from breaching a taxpayer-facing system, has been widely criticized by cybersecurity experts. Read more...

  • A New, Post-Snowden InfoSec Model

    'Golden Age of Surveillance' Despite Widespread Encryption A New, Post-Snowden InfoSec Model
    Peter Swire

    A game-changing impact of the Edward Snowden leaks about previously secret National Security Agency surveillance activities is the increased use of encryption, such as to protect email, says Peter Swire, a former White House chief privacy counsel. Read more...

  • IRS: 100,000 Taxpayer Accounts Breached

    Stolen PII Helped Hackers Evade Authentication Defenses IRS: 100,000 Taxpayer Accounts Breached
    IRS headquarters in Washington

    Using personal information gained from third-party sources to circumvent authentication protections, hackers breached 100,000 accounts of taxpayers who had used the IRS's "Get Transcript" application, which has been temporarily shuttered. Read more...

  • Senate Delays NSA Bulk Collection Vote

    Will Reconvene May 31 to Decide Whether to Scrap Program Senate Delays NSA Bulk Collection Vote

    The U.S. Senate has delayed until May 31 a decision on whether to follow the House and approve a proposal to scrap the National Security Agency's bulk collection of Americans' telephone metadata. Read more...

  • Limiting 'Intrusion Software' Exports

    Plan Aims to Foil Adversaries from Buying Zero-Day Exploits Limiting 'Intrusion Software' Exports
    Department of Commerce headquarters

    A U.S. Department of Commerce proposal to restrict the export of so-called "intrusion software" to prevent foreign adversaries from acquiring zero-day exploits has raised concern in the developer community. Read more...

  • Interview

    Warning: Security Alert Overload

    Expert Says Warnings and Alert Messages Are Failing Us By Mathew J. Schwartz
    Warning: Security Alert Overload

    Vendors' and software makers' over-reliance on security messages and warnings has left users habituated to them, thus rendering such alerts less effective or even worthless, warns cybersecurity expert Alan Woodward.

  • Blog

    How VA Keeps Medical Devices 'Clean'

    CIO Offers Best Practices for Securing Devices By Marianne Kolbasuk McGee
    How VA Keeps Medical Devices 'Clean'

    In the wake of recent alerts about infusion pump security vulnerabilities, now's a good time for all healthcare organizations to reassess their basic practices for keeping medical devices secure and safe. Check out what the VA is doing.

  • Blog

    The Internet of Buggy Things

    It's Time to Patch or Pitch Vulnerable Devices By Mathew Schwartz
    The Internet of Buggy Things

    It's no surprise that virus-wielding hackers are exploiting Internet of Things devices. Blame too many device manufacturers rushing products to market, skimping on secure development practices and failing to audit the third-party code they use.

  • Interview

    Manhattan Project for Cybersecurity R&D

    Employing ISAO to Get Researchers to Collaborate By Eric Chabrow
    Manhattan Project for Cybersecurity R&D

    Citing as inspiration the Manhattan Project, in which the United States developed the atomic bomb during World War II, Sam Visner is leading an effort to get cybersecurity researchers to collaborate in developing new ways to defend cyberspace.

  • Article

    Impact of N.Y. Agency Head's Departure

    Sizing Up the Fate of Planned Cybersecurity Initiatives By Tracy Kitten
    Impact of N.Y. Agency Head's Departure

    Will the upcoming departure of Benjamin M. Lawsky, superintendent of the New York State Department of Financial Services, slow down recently announced plans for new cybersecurity initiatives?

More news...

Webinars

  • Combatting Account Takeover Fraud & Remote Access Trojans

    Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls. In this live...

  • 2015 Insider Threat Report

    Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for...

More webinars...

White Papers

More whitepapers...
ARTICLE Retail Breaches: More to Come

The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was...

Latest Tweets and Mentions

ARTICLE Retail Breaches: More to Come

The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was...

The ISMG Network