In the face of new cyber-attacks, enterprises must deploy new security intelligence platforms with analytics to gain greater visibility and reduce incident response time, says LogRhythm's Taylor-Mountford.
Attributing the Anthem, OPM and other breaches to specific attackers might be useful for government-level diplomatic efforts. But organizations must prioritize blocking all types of espionage and cybercrime attacks, says Symantec's Vikram Thakur.
Organizations are jumping on the threat intelligence bandwagon, but are they making strategic investments? Often not, says BrightPoint Security's Rich Reybok, who says "context" is often the key missing element.
Post-OPM breach legislation aimed to toughen cybersecurity at federal government civilian agencies by requiring the implementation of state-of-the-art tools has passed the Senate Homeland Security and Governmental Affairs Committee.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
U.S. banks and credit unions suing Target for reimbursement of costs associated with its massive 2013 data breach want a court to force the retailer to disclose more details about its breach and security practices.
Could a change to federal law help prevent breaches such as those at the Office of Personnel Management that exposed the private information of more than 22 million individuals? Sen. Ron Johnson thinks so.
A breach of patient data on a Web portal was discovered during a lengthy criminal investigation into a multi-million-dollar fraud scheme targeting Healthfirst, a New York-based managed care organization.
Planned Parenthood has reportedly notified the FBI and Department of Justice of an apparent hack attack against the organization. An anti-abortion group that calls itself 3301 is taking credit for the hack.
Gene Fay of Resilient Systems says the traditional method of solving risk issues through technologies no longer works. Instead, he says, security must be built on the foundation of an effective incident response plan.
RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
Retailer Neiman Marcus suffered a setback in its attempt to win dismissal of a class-action lawsuit related to its 2013 breach. A federal court ruled that the suit can continue. But will the decision create a significant legal precedent?
Amit Yoran, president of RSA, says Asian organizations must re-think their approach to security. He outlines five key steps to building a resilient cyber defense mechanism. But how do security leaders respond?