We've seen user-driven trends such as BYOD before, says Kevin Flynn of Fortinet. And if organizations remember past security lessons, they will avoid falling prey to mistakes that could lead to breaches.
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
DDoS attacks against U.S. banking institutions have exposed website vulnerabilities organizations have failed to address, says Jason Malo of CEB TowerGroup. Here, Malo offers defense strategies.
A self-proclaimed member of the hacktivist group Izz ad-Din al-Qassam Cyber Fighters says Iran is not backing DDoS attacks against leading U.S. banks. What else did he reveal about the DDoS attacks?
In this week's breach roundup, read about the latest incidents, including the breach at Ohio State University's dentistry school, TD Bank notifying customers six months after a breach and a British charity being fined for failing to safeguard sensitive information.
Regions Bank is the eighth U.S. financial institution apparently targeted by a DDoS attack believed to be waged by the hacktivist group Izz ad-Din al-Qassam. Experts say banks should brace for more attacks on the way.
The hacktivist group known as Izz ad-Din al-Qassam apparently made good on its promise to take down Capital One's online presence. So what does this latest in a series of DDoS attacks mean for other banks?
Major European institutions are not prepared to prevent or respond to online attacks such as those reportedly hitting U.S. institutions, according to fraud and security experts at ENISA and Barclays.
Breaches of online accounts prove organizations need to focus more on password protection. But Araxid's Brent Williams says enhancing password security doesn't have to be rocket science.
The National Institute of Standards and Technology says intrusion detection and prevention software has become a necessary addition to the IT security infrastructure of many organizations.
The number of IT security job postings is up 60 percent this year on technology job board Dice.com. What are the top five most in-demand security skills, and what do these jobs currently pay?
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.