As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
IEEE sees 2012 as a disruptive year of widespread mobile-device intrusions as a growing number of smartphones - now 20 percent of the market - make them an attractive target for hackers.
A wave of security breaches serves as a catalyst for all types of organizations to assess the need for cyber insurance. Here's the story of one institution that saw the threat and took out a $10 million policy.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
New research from Carnegie Mellon University's Software Engineering Institute provides further evidence why IT security isn't just the problem of an enterprise's security organization but of its top non-IT leadership as well.
A hacker anywhere in the world could easily track the whereabouts and file-sharing habits of a Skype user and use the information for purposes of stalking, blackmail or fraud.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Don't be too fast to blame Research In Motion for the disruption in BlackBerry service if your organization suffered from the lack of e-mail exchanges. It could be partly your fault, too, says noted infosec lawyer Francoise Gilbert.
RSA Chief Executive Art Coviello challenged a widespread belief that cybersecurity awareness could curb cyberthreats: "There's no amount of consumer education to make them smart enough to resist attacks. They're just too sophisticated."
The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.