It isn't just the quantity of cyber-attacks that's staggering; it's the quality. The average hacker now has access to nation-state-level attack capabilities, says James Lyne of Sophos. How can organizations defend?
The European parliament recently voted to extend and strengthen the European Network and Information Security Agency. What does this news mean for Europe's top cybersecurity agency and for the state of emerging threats across Europe?
To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.
The Federal Information Security Amendments Act would require agencies to continuously monitor their IT systems for cyberthreats and implement regular threat assessments.
Kaspersky Lab has identified a new spear-phishing attack involving a Trojan designed to target Android devices. Researcher Kurt Baumgartner says organizations need to be prepared for more mobile malware attacks.
Sensitive information contained in Securities and Exchange Commission computers are at risk of being publicly exposed because of lack of proper controls, according to audits by the SEC inspector general.
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
The latest report to Congress on the implementation of the Federal Information Security Management Act runs 68 pages. But even after reading the entire report, don't be surprised if you can't tell if government IT systems are secure. Here's why.
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more...
The bill's chief sponsor says agencies struggle with cyberthreats. "This update to FISMA will incorporate the last decade of technological innovation, while also addressing FISMA shortcomings realized over the past years." Rep. Darrell Issa says.
Congressional auditors contend the Internal Revenue Service has failed to implement effectively parts of its IT security program, which could adversely affect the confidentiality, integrity and availability of sensitive taxpayer information.
Malware was spread in unique ways in 2012, particularly through drive-by exploits. In 2013, organizations can expect more exploits targeting social networks, says Adam Kujawa of Malwarebytes.
Phishers now shield malicious code behind the guise of legitimate digital certificates. How can organizations ensure they don't fall victim to these attacks? Jerome Segura of Malwarebytes offers tips.
From sophisticated malware to socially-engineered schemes, banking institutions of all sizes are under constant, multi-channel attack. How can they respond? Daniel Ingevaldson of Easy Solutions shares ideas.
Advanced persistent threats are evolving, and banks can help thwart them by using continuous monitoring for real-time detection, says J. Paul Haynes of eSentire.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.