Top executives must be transparent with their stakeholders when their IT systems get attacked. Otherwise, their enterprises' reputations could be more severely damaged, says IBM Fellow Luba Cherbakov.
When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
The hacktivist group Izz ad-Din al-Qassam launched a series of eight sophisticated DDoS attacks at leading U.S. banks. What lessons have been learned so far, and what additional steps can be taken?
Online attacks aimed at major U.S. banks have helped to heighten industry cooperation and information sharing. But experts say not all attacks are equal, and understanding the motivation behind the attack is key.
The growth in messaging technologies has fraudsters targeting new channels to attack organizations. Craig Spiezle of the Online Trust Alliance offers tips on how to improve messaging security.
A move to cloud-based e-mail services should save time, resources and taxpayer dollars, the GSA says. But will the move cause angst about security issues? Find out all the details.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
Some U.S. federal agencies seem to be going too far in monitoring their employees' communications activities on their government-issued laptop computers.
Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?
International law enforcement agencies last week touted the takedown of 36 websites that were used to sell stolen debit and credit data for more than 2.5 million accounts. But how much of an impact will the takedown ultimately have on card fraud?
Rep. Dan Lungren, the bill's chief sponsor, contends the regulatory approach taken by his bill would be less intrusive on the private sector than proposed Senate legislation and a plan by President Obama.
"We will provide critical infrastructure owners and operators the timely access to actionable cybersecurity information necessary to protect their own networks and facilities," says one of bill's chief sponsors, Rep. Dan Lungren.
Draft legislation establishing a public-private sector National Information Sharing Organization received generally favorable reviews from a panel of witnesses testifying before a House panel.
Legislation to give the federal government authority to share classified cyber-threat information with approved American companies was introduced in the Congress by the chairman and ranking member of the House Intelligence Committee.
U.S. and Estonian authorities have broken up one of the largest Internet crime schemes that allegedly netted $14 million in fraudulent advertising fees and infected 4 million computers in 100 countries.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.