Is a ransomware infection always a data breach? Yes.
FedEx’s disclosure of a material impact from NotPetya last week highlighted the awkward two-step that companies play around malware outbreaks and data breaches.
FedEx’s disclosure of a material impact from NotPetya last week highlighted the awkward two-step that companies play around malware outbreaks and data breaches.
FedEx’s disclosure of a material impact from NotPetya last week highlighted the awkward two-step that companies play around malware outbreaks and data breaches.
Security researchers have discovered a serious, remotely exploitable vulnerability in a code library that’s present in potentially tens of millions of devices, mainly Internet-connected security cameras.
Security researchers have discovered a serious, remotely exploitable vulnerability in a code library that’s present in potentially tens of millions of devices, mainly Internet-connected security cameras.
Why do organizations continue to invest in perimeter security even when data suggests it is not stopping hackers? Because of how much they’ve already invested in perimeter security, of course!
Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
One of the few areas of information security that has yet to receive the kind of intense study it deserves is supply chain security, the way that software and hardware manufacturers up and down the continuum handle the security of their products while they’re in production. That’s about to change, though, as researchers at the University of California at Irvine are establishing a program to look at ways to improve supply chain security, among other key topics.
Using security analytics tools, enterprises and smaller organizations alike are better equipped to collect as much useful data as possible to improve detection and provide proactive alerts for attempted attacks or incidents that are in progress.
RSA’s Dan Cohen discusses current trends in cybercrime, from shifting tactics to the commercialization of the digital underground.