"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.
In the wake of DDoS attacks aimed at five banks, and a fraud alert from FS-ISAC, U.S. banking institutions are taking several steps, including upping technology investments. What other actions are they taking?
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they defend against these attacks? Ashley Stephenson of Corero Network Security offers insights.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they...
"Given the gravity of the threats we face in cyberspace, we want to get this right in addition to getting it done swiftly," White House spokeswoman Caitlin Hayden says of a proposed executive order to strengthen critical infrastructure IT.
A wave of distributed denial of service attacks on banks raises the question: Should the owners of the nation's critical information infrastructure, when assessing risk, be held to a higher standard because society relies on them to function?
A group of Republican senators warn President Obama not to issue an executive order to create voluntary IT security standards, saying such action would aggravate the existing divide among lawmakers that prevented a vote on the Cybersecurity Act.
Website outages at leading U.S. banks have garnered global attention. But how concerned should European institutions be that they could be the next targets? A London-based security expert shares insight.
A denial of service attack may pose less immediate risk than a data breach - but it's trickier to respond to, says attorney Ronald Raether. What tips does he offer to organizations targeted by DDoS attacks?
Online attacks aimed at major U.S. banks have helped to heighten industry cooperation and information sharing. But experts say not all attacks are equal, and understanding the motivation behind the attack is key.