Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
Cybercrime is a global and systemic problem that's growing exponentially. High-profile attacks can be committed with less sophistication because of services for hire readily available on criminal forums. This has resulted in making the methodology and attack vectors mainstream. The impact of new types of crime, as...
In the move to a cashless economy in India and elsewhere, improving user authentication is critical, but users are demanding ease of use, says Singapore-based Tom Wills, director at Ontrack Advisory. He describes the roles that biometrics and artificial intelligence will play.
The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
Most large organizations at least pay lip service to breach preparedness. But when it comes to proper policies, planning and practice, far too many still fall short, says Stuart Mort of the Australian telecommunications firm Optus. Here's what they are overlooking.
Organizations need to take a well-considered, structured approach to integrating IoT into existing information risk management processes to address security, Gartner's Ganesh Ramamoorthy explains in an in-depth interview.
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior, as compared to peers in their sectors.
Yet, only 29 percent say that they are very confident in the effectiveness of their security controls, and nearly half say that they have gaps in detecting...
Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true risk appetite and the business value of blending storytelling techniques into your security awareness programs.
Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
Bad security habits of consumers whose use of apps is skyrocketing is leading to increased risks for businesses as they ramp up their use of apps as well, says Neil Wu Becker, a global vice president at A10 networks, who emphasizes the need to enforce best practices.
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
Despite being one of the most heavily regulated industries, Healthcare companies still struggle to assess their risk at more than a surface level. A good assessment has to include people, policies, procedures, controls and technologies. The task is daunting but increasingly critical.
Download this case study...
Security professionals think in terms of risks and threats to ensure that the right security measures are deployed in the right places and to a proper degree. Security teams need an evaluation process to help them determine whether an object is under-protected or over-protected, but traditional security assessment...
One of the most frustrating threat innovations of the last decade has been ransomware malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims.
In this Infographic, Forcepoint Security Labs examines the technical and business...