The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel. The breach alert follows a recent GAO report warning of serious cybersecurity shortcomings in U.S. weapon systems.
Cryptojacking - the hidden mining of virtual currencies - continues to be a focus for online attackers. As the detection of cryptocurrency mining malware continues to rise, Europol warns that cryptojacking will remain "a regular, low-risk revenue stream for cybercriminals."
Millions of internet-of-things devices made by the Chinese company Xiongmai and sold in stores such as Home Depot and Wal-Mart still have glaring security problems, a security consultancy warns. The findings come two years after the Mirai botnet targeted Xiongmai devices.
Emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals.
Download this eBook and learn what's working from 7 leading security experts and how they've influenced their organization to make the necessary changes to...
What is new in endpoint security? To find out, we drilled into the question of endpoint security with 32 experts to discuss these aspects of endpoint security:
Keys to shutting down attacks
Rethinking your network strategy
Justifying the value of endpoint security
Moving to a cloud-based next-generation platform...
The healthcare sector needs to continue upping its ante in cybersecurity to prevent potentially catastrophic "doomsday" events that could devastate regional healthcare systems, says Erik Decker, CISO of the University of Chicago Medicine. He's helping draft a guide to mitigating five key cyber threats.
Did the Chinese government pull off one of the most secretive hardware hacks of all time? That's what information security experts are pondering after a Bloomberg report described an espionage operation that purportedly planted a tiny spying chip on widely distributed server motherboards.
The latest edition of the ISMG Security Report features an analysis of the latest developments in Facebook's massive data breach and expert analysis of the potential for nation-state interference in the U.S. midterm elections.
Suzanne Spaulding, former undersecretary for the Department of Homeland Security, says a key way to ensure public confidence in the security of U.S. elections is to rely on paper ballots for voting or as backups for electronic balloting.
As new payment options continue to emerge via mobile phones and internet of things devices, the PCI Security Standards Council is broadening its security efforts, starting with a new standard for contactless payments coming early next year, says Troy Leach, PCI SSC's chief technology officer.
Endpoint management, while broad from a technology standpoint, is moving in a definitive direction - the ability to centrally discover, provision, deploy, update, and troubleshoot endpoint devices within
an organization. The proliferation of laptops, desktops, and more will propel the worldwide market for
The workplace is transforming, and keeping up with evolving security
threats has become more critical and challenging than ever. Malware
attacks come from all directions and according to IDC, 70 percent of
successful breaches begin at the endpoint.1 This means that having a
comprehensive endpoint management...
Smartphones present a uniquely large attack surface that has been repeatedly exploited by threat actors, making it risky to trust these devices with important data. Inherent limitations in the mobile architectures of
these devices - especially in a world of chip-based attacks - mean that organizations must find new...
Smartphone cameras and microphones act as the eyes and ears of the digital age, capable of capturing the smallest audio and visual details in high-definition clarity. Unfortunately, threat actors have demonstrated the ability to hijack these smartphone components, using them to gain valuable insights about targeted...
With 90% of organizations expected to have hybrid cloud infrastructure by 2020, the migration to the cloud is here to stay. Yet the reality is that digital environments can be a security blind spot for many organizations who struggle with the limited visibility and control, especially as their existing security tools...