The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president's schedule, CNN reports.
The Health Information Trust Alliance is attempting to launch a study, fueled by anonymized data gathered from healthcare organizations, to get a better understanding about the severity and pervasiveness of cyber-attacks in the sector.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
Troy Leach of the PCI Security Standards Council says data security standards are not failing; they just aren't being applied continuously. And conformance with the Payment Card Industry Data Security Standard is just one piece of the puzzle.
As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the strategies and tools...
The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails.
Historically, phishing attacks targeted end-users with attackers going after credentials to...
Declaring a national emergency over hack attacks, President Obama signed an executive order authorizing the government to impose sanctions on hackers. But information security experts voice questions - and concerns.
Businesses targeted by ransomware attacks are increasingly willing to negotiate with - and even pay - their extortionists. But negotiating with cyberthieves is never a good idea.
Some legal and security experts are questioning the potential effectiveness of President Obama's new executive order that allows the U.S. government to block or seize the assets of individuals suspected of launching significant cyber-attacks
While several experts say two new cyberthreat alerts from the FFIEC are primarily designed to make sure that smaller institutions are mitigating ongoing threats, Shirley Inscoe of Aite says they could also be an indicator of new threats on the horizon.
Financial services institutions are at the forefront of Cyber-attacks and keeping information safe is critical to maintaining customer confidentiality, ensuring regulatory compliance, and protecting the brand. In response, Network Security strategies are being adapted to provide traditional prevention at the edge,...
Advanced Threats are taking advantage of the typical flat Internal Network of Financial Services firms. Once through the border defense, there is little to stop their spread and eventual extraction of valuable targeted assets. Because traditional firewalls have been architected to slower speeds of the Internet Edge,...
Firewalls and network security were long considered a perimeter defense, keeping the bad guys out and containing confidential data inside. But as threats have become more sophisticated, the perimeter has become porous, and recent high-profile security breaches such as at Home Depot and Target show demonstrate that...
Network protection can be a difficult balancing act for security vendors and IT administrators alike. How do you achieve very high levels of performance while still ensuring the strongest possible security without impacting end users? After all, as the depth with which network traffic is inspected increases, so too do...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.