The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.
Jan Koum, WhatsApp's co-founder, is leaving Facebook. His departure marks another exit of a high-level privacy and security advocate. If Facebook continues to lose those who could better influence the social networking site's worrying views toward user data, what does that mean for the rest of us?
You know that you've got a problem to solve but how will you address it? More importantly, who will help you address it? This is the crux of the build versus buy debate that companies are currently having with themselves.
While building and buying both have their merits, they also have costs which should be...
Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.
"Cyber fatigue," the result of being constantly under attack, leads to security mistakes, says Richard Ford of Forcepoint, who discusses what can be done to address the issue.
Cryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew Hickey and Jennifer Arcuri outline its potential.
Makers of internet of things devices - especially those that handle health information - must implement protections into their product development lifecycle to effectively safeguard consumers' data, says regulatory attorney Elliot Golding.
The FDA is proposing to pre-certify vendors of certain medical device software, including various mobile apps, allowing the companies to skip the agency's much more rigorous pre-market approval process for hardware-based medical devices.
When visibility into systems is subpar, attackers gain an edge, says Michelle Cobb of Skybox Security, who offers insights on using the right technologies.
What endpoint security practices yield the best results? Richard Henderson of Absolute Software describes how to use effectively use appropriate technologies.
Can technology solve the problem of giving law enforcement access to all encrypted communications without additional risks to the public? Software legend Ray Ozzie says he has an idea. But it's unlikely to quell the debate over hard-to-break encryption.
Two recent security incidents involving ransomware attacks on vendors serve as the latest reminders of the risks business associates pose to healthcare organizations. What steps should entities take to mitigate those risks?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.