SunTrust Banks is the seventh U.S. financial institution hit by a DDoS attack apparently orchestrated by the hacktivist group Izz ad-Din al-Qassam. The group is threatening to hit Regions Financial Corp. next.
With President Obama on the hustings, his national security staff back at the White House is busily addressing cybersecurity matters that should, but aren't, making it to the presidential campaign.
RSA says 30 U.S. banks are potential targets of a massive Trojan attack, and alleged hacktivists say three more institutions will be hit by DDoS attacks this week. How must banks respond to the latest threats?
The hacktivist group known as Izz ad-Din al-Qassam apparently made good on its promise to take down Capital One's online presence. So what does this latest in a series of DDoS attacks mean for other banks?
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
Lost and stolen unencrypted mobile devices are reoccurring culprits in data breaches. So why isn't the use of encryption more widespread? And how are organizations ramping up mobile security?
The Department of Veterans Affairs' mobile device management system, which will support 100,000 devices, will be cloud-based and will be paired with an apps store.
"Given the gravity of the threats we face in cyberspace, we want to get this right in addition to getting it done swiftly," White House spokeswoman Caitlin Hayden says of a proposed executive order to strengthen critical infrastructure IT.
A wave of distributed denial of service attacks on banks raises the question: Should the owners of the nation's critical information infrastructure, when assessing risk, be held to a higher standard because society relies on them to function?
The Cloud Security Alliance has formed a big data working group to address privacy and security challenges among organizations. What are those challenges and how does the group aim to tackle them?
The gut feeling many people have about their physical security hasn't quite developed in the digital world, presenting a challenge for homeland security officials, says State of Delaware Homeland Security Adviser Kurt Reuther.
When managers commit financial fraud, their schemes tend to cost organizations twice as much as when non-managers instigate these crimes. That's one key finding of a new insider fraud study.
Delaware Gov. Jack Markell speaks of empowering information security personnel in state agencies to spread the gospel of secure computing to those in and out of government.
The Department of Veterans Affairs has issued a contract for a mobile device management system that's expected to support more than 100,000 devices. Find out which company won the business.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.