An estimated half of all ransomware infection victims give in to criminals' ransom demands, thus enticing attackers to refine and continue their campaigns, warns Intel Security's Raj Samani in this video interview.
DDoS attacks are on the rise, and they come across multiple vectors. In this video interview, Paul Nicholson of A10 Networks describes how organizations can defend against DDoS - and why SSL traffic inspection is a must.
More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
Webroot has just released its 2016 edition of its annual threat brief. In an exclusive interview, Michael Malloy, executive vice president of products and strategy, discusses the report and how its key findings will likely play out in the year ahead.
Threat response is a lot like physical fitness. Enterprises know what they need to do - they often just opt not to do it. RSA's Rashmi Knowles offers advice for how to move from threat prevention to response.
The security industry has been too focused on managing identities - and not focused enough on privileged access, says Andy Vallila of Dell Security Solutions. In this video interview, he discusses the level of visibility organizations need for privileged accounts.
Malwarebytes has long been a force in the consumer space, but now its focus is on enterprise breach remediation. In this video interview, Pedro Bustamante explains the enterprise strategy and discusses proactive malware hunting.
As a vice president at IBM Security, Caleb Barlow has been a leader in the company's strategic acquisitions. What does he look for in a potential venture, and how is IBM Security taking shape to respond to the latest threats? Find out in this video interview.
Organizations can apply user behavioral analytics - the practice of reacting to how people behave in the information security realm - to better spot and block data breaches, says Fortscale's Kurt Stammberger.
Virginia Gov. Terry McAuliffe has a message for state leaders across the nation: Cybersecurity has to be a top item on their policy platforms. And, by the way, he very much intends to make Virginia the cyber capital of the United States.
Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.
The discovery of a serious flaw in Linux's GNU C Library demonstrates just how long serious flaws can persist in code that underpins the Internet infrastructure, warns Dan Kaminsky of White Ops in this video interview.
After years of being kept in the background, privacy has taken center stage in security discussions. In this video interview, Michelle Dennedy, chief privacy officer at Cisco, discusses the impact of new regulations and the issue of encryption backdoors.
Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.
A year after retiring as chair of RSA, Art Coviello returns to the RSA Conference and, in this video interview, offers candid thoughts on the state of the industry, the global threats that concern him most and the significance of the legal struggle between Apple and the FBI.