According to one report, barely one-third of global organizations feel prepared to handle a modern cyberattack such as malvertising or ransomware. Justin Dolly of Malwarebytes explains how security leaders can step up their game in 2017.
Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
According to a recent report, barely one-third of global organizations feel prepared to handle a modern cyberattack such as malvertising or ransomware. Justin Dolly of Malwarebytes explains how security leaders can step up their game in 2017.
Dolly, who is both CIO and CISO at Malwarebytes, says he is not surprised...
Facebook, Microsoft, Twitter and YouTube have promised to contribute to a shared database containing hashes - digital fingerprints - of images and videos that promote hatred or terror to facilitate more rapid takedowns. But does the project go far enough?
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system? Kurt Bertone of Fidelis Cybersecurity lays out what to look for in a next-gen IPS.
A just-issued report from President Obama's Commission on Enhancing National Cybersecurity outlines challenges the next administration should address. Observations from one of the panel's commissioners highlight the latest episode of the ISMG Security Report.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
Government entities struggle not just to measure the effectiveness of their cybersecurity controls, but also how their metrics align to the agency's unique mission. Matt Alderman and John Chirhart of Tenable Network Security offer advice.
Part of the challenge is being able to identify the right metrics, says...
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system? Kurt Bertone, a security expert with more than two decades in the business, lays out what to look for in a next-gen IPS.
"The biggest problem with IPSs today is that organizations...
Hackers apparently stole $31 million from accounts that banks keep at Russia's central bank in a series of cyberattacks this year, according to several news reports. The news comes as the country's security service also claims to have fought off broader attacks against the financial services industry.
Acknowledging the urgent IT security challenges the nation faces, a cybersecurity commission named by President Barack Obama encourages the incoming administration to adopt some of its recommendations in the first 100 days of Donald Trump's presidency.
Today's ISMG Security Report leads off with House Homeland Security Committee Chairman Michael McCaul and DHS Secretary Jeh Johnson lamenting about the congressional bureaucracy that hinders passage of needed cybersecurity legislation.
Ransomware has grown, evolved, and come into widespread use among hackers - and in 2016 it has fully come of age. Hundreds of new variations have sprung up this year alone.
Join two security experts, Rod Rasmussen and Sean Tierney, as they cut through the headlines and horror stories with substantive information on...