The Latest News

  • Fed, State Regulators: Reform Is Needed

    OCC, NY DFS Call for Better Standards, Info Sharing Fed, State Regulators: Reform Is Needed
    Thomas Curry and Benjamin Lawsky

    Banking institutions' technical and procedural shortcomings pose increasing risks to the nation's critical infrastructure, two banking regulators note. Learn why they say more transaction monitoring and information sharing are needed. Read more...

  • Apple Pay: Authentication a Soft Spot

    Mobile a Breeding Ground for Counterfeit Card Fraud Apple Pay: Authentication a Soft Spot

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases. Read more...

  • What is Gov't Role in Info Sharing?

    Researcher Says Private Sector Input Will Hinge on Trust What is Gov't Role in Info Sharing?
    Lance James

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James. Read more...

  • Hackers Steal Trading Algorithms

    Attacks Aimed at Hedge Funds, Trading Firms Hackers Steal Trading Algorithms

    Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks? Read more...

  • Police Disrupt Banking Malware Botnet

    But Worldwide Impact of Ramnit Takedown May Prove Temporary Police Disrupt Banking Malware Botnet

    Authorities have disrupted a botnet that was serving up the Ramnit banking malware, which has infected 3 million PCs worldwide. But information security experts warn that the disruption will likely be temporary. Read more...

  • Article

    Apple, Android Prep 'Freak' Fix

    Exploiting Crypto Flaw Breaks HTTPS on Devices, Sites By Mathew J. Schwartz
    Apple, Android Prep 'Freak' Fix

    Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.

  • Article

    Reversal of Fortune: DHS Funding OK'd

    Boehner Persuades Enough GOP Lawmakers to Back Measure By Eric Chabrow
    Reversal of Fortune: DHS Funding OK'd

    Congress has voted to fund the Department of Homeland Security through September, the end of the fiscal year, averting another threatened shutdown that would have curtailed some cybersecurity programs.

  • Article

    Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond By Mathew J. Schwartz
    Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

  • Article

    Cool Reception for Obama's Privacy Plan

    Businesses Would Help Define Consumer Privacy Bill of Rights By Eric Chabrow
    Cool Reception for Obama's Privacy Plan

    The Obama administration's discussion draft for a Consumer Privacy Bill of Rights law has some of the president's usual supporters saying they're disappointed in his proposal. Find out why.

  • Blog

    EMV Migration: The Merchants Fight Back

    Merchants Say Tokenization a Better Long-Term Security Solution By Tracy Kitten
    EMV Migration: The Merchants Fight Back

    Why aren't more U.S. merchants in a hurry to implement EMV? Two national retail association executives answered this question at Information Security Media Group's Fraud Summit in Los Angeles.

More news...

Webinars

  • Advances in Application Security: Run-time Application Self Protection

    Enterprise information security encompasses a broad set of disciplines and technologies, but at the highest level they can be broken down into three main categories: network security, endpoint...

  • 2015 Insider Threat Report

    Insider Threats now play a major role in almost all of the high profile data breaches being experienced globally. If a primary element in a breach wasn't a traditional insider, as in the Korean...

More webinars...

White Papers

More whitepapers...
ARTICLE Cloud Security: How to Secure Buy-In, Budget

It is no secret that the move to cloud infrastructure offers organizations many compelling business...

Latest Tweets and Mentions

ARTICLE Cloud Security: How to Secure Buy-In, Budget

It is no secret that the move to cloud infrastructure offers organizations many compelling business...

The ISMG Network