Casino operator Affinity Gaming has sued incident response firm Trustwave, alleging that the firm failed to fully eradicate and "contain" the 2013 data breach and payment card malware outbreak that it was hired to remediate.
If your organization has intellectual property, customer data, or critical systems that are valuable, your employees are being targeted with spear phishing emails. To help security leaders strategically manage their defensive posture, we have created a four-phase framework that
spans relevant security layers from the...
Cryptocurrency exchange Cryptsy has revealed that it suffered a 2014 hack attack that now leaves it insolvent. The exchange is appealing to its attacker to return the stolen bitcoins, worth $5 million today - no questions asked.
The FBI is investigating the point-of-sale malware breach at hotel chain Hyatt, which says related infections stretched for four months and affected 250 hotels worldwide. But Hyatt has yet to reveal how many customers or payment cards were compromised - or how attackers got in.
Tracing bitcoin transactions, some security experts suspect multiple gangs have each amassed more than $1 billion, making them the equivalent of "unicorns" - a term venture capitalists apply to extremely successful startup firms. In case there was any doubt, cybercrime really does pay.
Ask any cyber-security professional and they'll tell you that it's getting more difficult to prevent, detect, or respond to cyber-attacks, data breaches, and even data exfiltration. Why? The threat landscape continues to grow more dangerous while IT infrastructure becomes more complex with the addition of mobile...
When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and
data. But they surely could contain it. Today, this seems like something from a far-away age, even though it was accepted as reality just a decade ago.
Download this white...
Whether employees are negligent or malicious, IT security teams (and ultimately, CISOs) are responsible for protecting the organization
from breaches and risky behavior. But outdated, traditional security solutions don't offer enough protection from threats inside organizations. Security professionals need a new...
The launch of email, the expansion of networking and data sharing, along with the introduction of the domain name system, has created technological, innovative opportunities for individuals, businesses, and governments worldwide. However, these opportunities also presented themselves to threat actors - criminals...
Will this week's arrests of a "main target" and another suspect tied to the distributed denial-of-service extortion group known as DD4BC deter copycats from waging similar schemes? Experts weigh in.
European police have arrested a "main target" as part of a previously undisclosed law enforcement effort, dubbed Operation Pleiades, against the distributed denial-of-service attack gang called DD4BC, or "DDoS for Bitcoin."
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Mike Siegel, VP of Products at Forcepoint, shares strategy and solutions.
A team of cryptographers has found that the random-number generator Dual_EC - known to have been backdoored by the NSA - was added to Juniper's ScreenOS firmware around 2008 and is still present, although the networking giant has promised to soon replace it.
The primary mission of the new Global Cyber Alliance is to identify measurable ways to mitigate cyberthreats facing the public and private sectors, says Phil Reitlinger, a former DHS official and Sony CISO, who heads the new group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.