The Cryptographer's Panel, which sees five cryptography experts analyze and debate top trends, remains a highlight of the annual RSA conference. For 2020, the panel focused on such topics as facial recognition, election integrity and the never-ending crypto wars, while giving shout-outs to bitcoin and blockchain.
Two Chinese nationals have been indicted by the U.S. Justice Department for allegedly laundering $100 million in cryptocurrency stolen by North Korean hackers in 2018.
The U.S. is late to the 5G race. But there are multiple strategies that policymakers can pursue to facilitate the near-term rollout of safer and more trusted 5G networks across the country, says Michael Chertoff, executive chairman of The Chertoff Group and Department of Homeland Security secretary.
Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data and threatening to leak more unless the victim pays a ransom.
An alleged hacker who's accused of breaching the now defunct Ticketfly site in 2018 and exposing the personal information of about 27 million account holders has been indicted on a federal extortion charge, according to court documents filed by the FBI.
Marcus Fowler of Darktrace discusses the 2020 U.S. presidential election cyberthreat landscape and the roles that artificial intelligence and machine learning are now playing in mitigating more cyber risks.
In interviews at RSA 2020, former Department of Homeland Security Secretary Michael Chertoff and Andy Purdy, CSO for Huawei USA, offer different points of view on 5G security.
This special edition of the ISMG Security Report focuses exclusively on the RSA 2020 conference. Featured are comments from former NSA Director Keith Alexander on "collective defense," plus a discussion on fighting payment fraud and a roundup of other important themes.
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
If you're in charge of IT security and your system gets knocked out of commission by a malware attack, this might be a resumé-generating event (RGE). A significant number of people lose their jobs in the wake of a ransomware attack or some other data breach.
To ensure you are not the next, download this white...
Designing Security as a User Experience
The ongoing battle between attackers and defenders have left valid users caught in the middle. Protecting user accounts with aggressive security policies leads to false positives and needlessly locks valid users out of their account, while lenient security policies lead to...
Among the top issues being discussed at the RSA 2020 conference this week is the need for more cybersecurity collaboration between government agencies and the private sector. Here are some interview highlights.
A former Microsoft software engineer was convicted this week on 18 federal charges tied to stealing more than $10 million through the company's online retail platform.
Targeted ransomware attacks against enterprises and government agencies are likely to surge in the coming months as "ransomware as a service" continues to evolve into a lucrative model for cybercriminals, security experts interviewed at RSA 2020 warn.
Indicators of compromise are important. But what if you could also detect patterns of behavior that tip you off before a crime? This is where Cybereason's Sam Curry is trying to shift the focus.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.