House Homeland Security Committee Chairman Michael McCall calls on Congress to increase spending on quantum computing research to ensure that the United States is the first nation to employ quantum computing as a tool to decrypt data. "We can't lose this one to the Chinese," he says.
Apple-FBI crypto debate update: A researcher successfully defeated an iPhone passcode using less than $100 in equipment. But the delicate procedure, if used on the San Bernardino shooter's iPhone, could have accidentally obliterated its data.
Because many law enforcement agencies lack cybercrime expertise, it's important for companies that have been attacked to provide as much technical and forensic information as possible to authorities to help ensure that investigations lead to arrests and prosecutions, a panel of experts says.
Kimpton Hotels & Restaurants is warning that all 62 of its hotels suffered a POS malware infection this year that resulted in the compromise of cardholder data. So far it's unclear if the attack relates to breaches of Oracle MICROS or other POS vendors.
A hacker attempted to steal user data relating to online hunting and fishing licensing applications in Idaho, Oregon and Washington, via cloud software vendor Active Network. But so far it's unclear if any applicants' information was taken.
A UAE-based activist targeted by a rare and valuable remote exploit for Apple's mobile software has caused concern over the continued sale of powerful spying tools to governments with poor human rights records.
Vendor risk management programs have evolved over time. What began as a spreadsheet or two to track vendors can't hold up to the ever-changing scope, scrutiny and shared risk. Putting more people on the problem quickly becomes a resource drain. What if you could eliminate time wasters associated with vendor risk...
A Fortune 50 Healthcare Company is under constant scrutiny from about the safety and security of their products, data and services. The company relies on more than 5,000 suppliers to conduct operations. Existing vendor assessment and tracking methods and tools could not keep up. They implemented Rsam's Vendor Risk...
Too often when organizations get shaken down by online criminals, they panic, and in the process make the predicament they're facing even worse, warns digital forensic investigator Ondrej Krehel in this video interview.
FireEye CEO Kevin Mandia has blamed his company's lower-than-expected quarterly revenue on the rise of ransomware and cyber extortion attacks and a decline in APT campaigns. Experts debunk those assertions.
Are You Testing for the Real World?
While seemingly subtle, the difference between emulation and simulation are crucial when it comes to ensuring realistic testing with reliable, repeatable results.
In order to have confidence in your systems, you need to continually test and monitor them with realistic...
Security firm ThreatConnect says Guccifer 2.0, who claims to be the lone hacker of the Democratic National Committee, may have close ties to Russia. But after reviewing related technical evidence, not all security experts agree.
Interbank messaging service SWIFT will begin collecting and sharing anonymized attack information and offering incident-response services - backed by Fox-IT and BAE Systems - to help hacked banks. But will financial institutions buy in?
When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal...
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.