The Latest News

  • Exclusive: Inside Verizon Breach Report

    Verizon's Bob Rudis on Takeaways from Latest Investigations Exclusive: Inside Verizon Breach Report
    Bob Rudis, Verizon

    High-profile breaches at Home Depot, Sony and others led many to declare 2014 "The Year of the Breach." But was it really? Verizon's Bob Rudis shares insights from the 2015 Verizon Data Breach Investigations Report. Read more...

  • Apple Systems Vulnerable to Bug

    Kaspersky Reports 'Darwin Nuke' Affects OS X, iOS Apple Systems Vulnerable to Bug

    Researchers at Kaspersky Lab have released information on a denial-of-service bug, dubbed "Darwin Nuke," found in Apple's operating systems. Security experts weigh in with recommendations. Read more...

  • How DNS is Exploited

    Dr Paul Vixie on How Criminals Leverage Internet Architecture How DNS is Exploited
    Dr. Paul Vixie, CEO, Farsight Security

    The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape. Read more...

  • GitHub DDoS Attack Traces to China

    Disruption Appears to Target Anti-Censorship Tools GitHub DDoS Attack Traces to China

    DDoS attackers have been targeting the popular code-sharing website GitHub. Security experts say the massive attacks appear to have originated from China and been designed to disrupt access to GitHub-hosted anti-censorship tools. Read more...

  • Hackers Wield Extortion

    Schemes Center on Lab Test Results, Nuclear Power 'Secrets' Hackers Wield Extortion

    More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers. Read more...

  • Interview

    PCI DSS Version 3.1 - What's New?

    Troy Leach of PCI Council Explains New Version of Standard By Tom Field
    PCI DSS Version 3.1 - What's New?

    The PCI Council has just released PCI DSS 3.1, which calls for mothballing the SSL encryption protocol. What do security leaders need to know about the revised standard? Troy Leach of the council offers insights.

  • Interview

    Framework for a New ID Ecosystem

    Draft of Model to Be Previewed at RSA Conference 2015 By Tom Field
    Framework for a New ID Ecosystem

    What is the Identity Ecosystem Framework, and why is it so important for security professionals to embrace? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.

  • Article

    FBI: ISIS Backers Deface Websites

    Bureau Also Warns of Fake Government Websites By Eric Chabrow
    FBI: ISIS Backers Deface Websites

    Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.

  • Article

    RSA 2015: Ripped from the Headlines

    Previewing the RSA Security Conference in San Francisco By Eric Chabrow
    RSA 2015: Ripped from the Headlines

    The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.

  • Article

    Singtel to Acquire Trustwave

    Telecom Firm to Pay $810 Million for Security Company By Varun Haran
    Singtel to Acquire Trustwave

    Singapore-based Singtel, Southeast Asia's largest telecommunications company, has entered a definitive agreement to acquire U.S.-based managed security services company Trustwave for $810 million.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    The Nitty Gritty of Sandbox Evasion

    Security vendors have reacted by selling sandboxes where malware is executed and malicious behavior observed. However, attackers have raised the bar and deployed numerous methods to bypass sandboxes...

  • PREMIUM MEMBER EXCLUSIVE

    2014 Identity Theft and Fraud Prevention Survey Results Webinar

    In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these...

More webinars...

White Papers

More whitepapers...
ARTICLE Obama to Congress: Enact Cybersecurity Laws

President Obama urged Congress in his State of the Union address to pass legislation to better meet...

Latest Tweets and Mentions

ARTICLE Obama to Congress: Enact Cybersecurity Laws

President Obama urged Congress in his State of the Union address to pass legislation to better meet...

The ISMG Network