Zero Trust Means Never Trust & Always Verify
Alan Zeichick | 7/30/2018 | Enterprise security teams have actually been practicing zero trust policies for a number of years, but new advances and better tools now make the philosophy easier to implement. Still, it's always best to verify.
Kronos Returns as Banking Trojan Attacks Ramp Up
Jeffrey Burt | 7/27/2018 | Proofpoint researchers have seen a new version of the four-year-old Kronos emerge in campaigns in Europe and Japan. The report also finds it may be rebranded as 'Osiris.'
California's CCPA Law: Why CISOs Need to Take Heed
Joe Stanganelli | 7/26/2018 | The recently enacted California Consumer Privacy Act, while hardly a sweeping reform of the state's privacy laws, changes the playing field for IT risk and liability where California residents' personal information is concerned.
Watch Out: The Dark Web Is Really Watching You
Alan Zeichick | 7/23/2018 | The Dark Web is a lot of things, but it's mostly a hangout for criminals and cyberthieves. However, this dark corner of the Internet may know more about you or your enterprise than you think.
More Data Breaches in Store for US Retail Industry
A report from Thales eSecurity and 451 Research finds that the security systems of US retailers are getting breached more often than their global counterparts. As a result, IT is rethinking its security spending.
SCADA/ICS Dangers & Cybersecurity Strategies
Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer.
IDT CIO Faces Down New Crop of Global Threats
Simon Marshall | 7/16/2018 | IDT CIO Golan Ben-Oni has faced down two serious cyberattacks in the last year and he expects more are on the way. From selecting vendors to thinking about the cloud, here's how Ben-Oi is rethinking the security landscape.
Attackers Increasingly Turning Attention to the Cloud
Jeffrey Burt | 7/13/2018 | In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
ICS Security: 'The Enemy Is in the Wire'
Threats to industrial control systems are real and frightening. The government is taking steps to keep us safer in the future, but there are near-term steps you can take right now.
Getting Safe, Smart & Secure on S3
AWS Simple Storage Service has proven to be a security minefield. It doesn't have to be if you pay attention to people, process, and technology.
HNS IoT Botnet Evolves, Goes Cross-Platform
Jeffrey Burt | 7/10/2018 | The Hide 'N Seek malware had previously targeted devices such as home routers and DVRs, but now the botnet is including Apache CouchDB and OrientDB in its expanding list of targets.
Cisco: GDPR Is About More Than Compliance
Jeffrey Burt | 7/10/2018 | Cisco's top privacy official says that the EU's new privacy regulations – GDPR – gives forward-thinking companies an opportunity to excel by building new data management and privacy models.
|