Cloud-based advanced threat protection helps organizations detect sophisticated malware that is able to bypass existing security measures. The key is to start with the premise that the network is already infected, says Seculert's Dudi Matot.
Faced with a vulnerability that exposes Microsoft's Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. Learn the steps they recommend.
The recent Verizon Data Breach Investigation Report notes more than 16,000 incidents in the past year where sensitive information was unintentionally exposed. "Nearly every incident involves some element of human error," the report notes.
The fact that the U.S. federal government would, under some circumstances, exploit software vulnerabilities to attack cyber-adversaries didn't perturb a number of IT security providers attending the 2014 Infosecurity Europe conference in London.
Following news of a serious zero-day exploit impacting several versions of Internet Explorer, the Department of Homeland Security is urging the use of other Web browsers until the issue has been remediated.
With the news that several large technology companies are going to assist in funding critical open source projects such as OpenSSL following the Heartbleed exploit, security experts weigh in on the move.
Following a data breach, sensitive information, including credit card data, is often sold through the underground economy. Security experts discuss why it's so difficult to shut down online criminal forums.
The Massachusetts attorney general has launched an investigation into a data breach involving a subsidiary of Experian. Earlier, attorneys general in Illinois and Connecticut announced similar investigations.
Iowa State University is notifying about 50,000 individuals who enrolled in certain classes between 1995 and 2012 about a hacking incident that exposed their personal information. Learn what steps the university is taking to improve security.