Whether you've visited the Dark Web or not, you're likely aware that
it's comprised of various anonymous forums and black markets.
Many of these Dark Web black markets are used for illegal activities,
like buying and selling drugs, weapons, confidential documents
and illegal services. While you may not be in the...
When it comes to the internet of things, balancing the need to protect privacy against the need for technological innovation, such as to improve healthcare, is proving challenging, says attorney Jean Marie Pechette.
Security leaders have been addressing the global skills gap for over a decade, with little to show for it.
However, a new approach - leveraging software as a service - is making up for the staffing shortfall.
The discussion really starts with software as a service. If you look at the benefits of leveraging the cloud...
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
Facebook is making substantial investments to improve its data security and privacy practices. But the long-term cost of those investments and impact on the bottom line has spooked investors, leading to a $120 billion loss in market value on Thursday, the largest one-day loss of value for a U.S. traded company.
There's no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we've seen a continued increase in attacks that directly target financial
organizations, which comes as no surprise. However, increased access to user and account data has...
In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a "double-edged sword" when using web-based technologies. As we've increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has the digital attack...
Cyber threat intelligence (CTI), when used correctly, provides visibility into attacks and
threats. However, security analysts are dealing with too many sources of intelligence. They
aren't able to correlate and narrow all these sources of intelligence to those events and
vulnerabilities that really matter. The...
Facebook has promised to bring machine learning to bear on the problem of hate speech and information warfare via its platform. But insiders have been urging the company to pursue a major cultural change, including prioritizing not doing anything "creepy" over the quest for short-term gain.
Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant authorities or face fines. The U.K.'s data privacy watchdog says it's already seen the volume of self-reported breaches quadruple.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
Barely one month after the enforcement date of the EU's General Data Protection Regulation, California passed its own landmark new data privacy legislation. Cisco Chief Privacy Officer Michelle Dennedy discusses this new law and what it says about the business value of data privacy.
Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.