A rider covertly added to the law to fund the government through September requires select agencies to assess technology purchases for cyber-espionage and sabotage, a process that could make it harder to buy wares to secure IT.
History shows that DDoS phase 3 may end soon, and banking institutions can expect an even more powerful 4th wave. "There is little reason for the attacks to cease," says Javelin's Al Pascual.
The FTC puts the onus on application developers to protect their organization's sensitive data by mandating the use of "reasonable" data security practices. What does this mandate mean in practice?
Computer networks in nations where the government has ratified international cyber-agreements have lower incidents of malware infection, says Paul Nicholas, Microsoft senior director of global security strategy and diplomacy.
TD Bank and Keybank confirm that their online-banking sites were hit by DDoS strikes last week. And one security expert says other banks were hit by sophisticated attacks as well.
What's the cost to an organization when it suffers a seurity breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
Venafi has just partnered with Ponemon Group to release a new survey, "The Cost of Failed Trust". Among the key...
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
The motive behind the cyber-attack on South Korean banks and broadcasters was atypical, as compared to most digital assaults that involve implanting malware on IT systems, says McAfee's Vincent Weafer.
When struck by DDoS, how - and what - should banking institutions communicate with their customers? Doug Johnson of the American Bankers Association advises on post-attack disclosure obligations.
A rapidly evolving threat landscape calls for the next generation of information security professionals to have strong technical and communications skills. Security leaders highlight their top requirements.
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
A 26-year-old former web producer charged with helping Anonymous hack into the website of the media giant Tribune Co. provided members of the hacktivist group with log-in credentials for a computer server, according to federal authorities.
Most people will remember March 13, 2013, as the day Cardinal Jorge Bergoglio ascended to the papacy as Pope Francis. But for those who consider cybersecurity vital for society's well-being, it's an historic date as well.
The rhetoric from White House officials and President Obama himself finally provide proof to the long-time claim that cybersecurity is a top administration priority.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.