A nation-state sponsored espionage campaign dubbed "Sea Turtle" has been manipulating the domain name system to target more than 40 organizations, including intelligence agencies - especially in North Africa and the Middle East, Cisco Talos warns. Experts say defenses against DNS hijacking lag.
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.
Machine learning is one of the tools that you should be using as part of a multifaceted fraud strategy at financial institutions. To get value out of ML, you need to have multiple inputs. You have to have an intelligence network and the location to gather all that network intelligence.
Download this eBook on the...
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it's disturbingly easy to do. All you need is a computer, a Tor Browser and Cryptocurrency, and it's all completely...
Businesses today face far more invasive and
potentially damaging threats than at any time
in the past. Your organization's IT security is
the first line of defense against incidents that
can cause business interruption and data
corruption. While backup should underpin
every business' data protection strategy, it...
Browser-based cryptocurrency miners are falling out of favor as virtual currency prices remain low, IBM says. But the company says malware-based miners are coming back, including fileless ones that rely on Powershell. Here's the lowdown.
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.
Application fraud losses are projected to top $1.3B in the US by 2020. Understanding the trends behind these staggering numbers is critical if institutions are to prevent crippling financial and reputational losses.
Join Aite's Senior Analyst, Shirley Inscoe, and DataVisor's Director of Solution Engineering, Alex...
Ex-black hat Alissa Knight recently joined Aite Group's new cybersecurity practice, and among her first tasks: a hard look at the security of major financial institutions' mobile banking apps. The results may surprise you.
Keynotes and briefings at the recent 28th annual RSA Conference 2019 covered a wide range of topics, including privacy, hackers, cyber extortion, machine learning, artificial intelligence, human psychology, legal matters, career advice and internet-connected device concerns. Here are 15 highlights.
Traditional security processes and controls don't translate cleanly to containers, says Sabree Blackmon of Docker, who does not recommend treating containers as virtual machines to help maximize the benefits.
How can an enterprise without a traditional perimeter understand and defend against orchestrated attacks designed to evade detection? JP Blaho of NETSCOUT Arbor offers insights on how to gain visibility.
Alert fatigue is a major challenge, and the ability of SOC teams to be proactive is hamstrung by the fact that they spend a lot of their time in doing repetitive work, says Cody Cornell of Swimlane, who advocates broader use of orchestration and automation.