Cyberattack biggest threat against U.S. financial system

When asked during congressional testimony last week, Federal Reserve Chairman Jerome Powell, who was appearing in front of the House Committee on Financial Services, told lawmakers that the number one threat to the stability of the U.S. financial syste… Continue reading Cyberattack biggest threat against U.S. financial system

Global critical infrastructure remains under significant cyber attack

Last week the Security Service of Ukraine (SBU) announced that VPNFilter malware made it into the nation’s critical infrastructure. This serves as a reminder that all critical infrastructure organizations, from utilities to chemical man… Continue reading Global critical infrastructure remains under significant cyber attack

DDoS attacks grow more popular, targeted

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report also found that Russia and China are initiating the most crede… Continue reading DDoS attacks grow more popular, targeted

Four ways security teams sabotage their own efforts

There are many reasons why enterprise security teams struggle to succeed in better managing the risks positioned against their data and business-technology systems. Sometimes these obstacles come from elsewhere within the organization, and sometimes th… Continue reading Four ways security teams sabotage their own efforts

Biometrics (finally) gaining widespread acceptance

It’s time for passwords to die, they said. Passwords are antiquated and don’t provide the level of security needed, they said. This was the marketing mantra of many an authentication and identity management vendor — 20 years ago. Of c… Continue reading Biometrics (finally) gaining widespread acceptance

OPM provides guidance to address cybersecurity skills gap

It’s hard to find (read: near impossible) an organization that thinks it has all the cybersecurity expertise that it needs. Whether it’s finding good CISOs, cloud security architects, application security experts, or whatever — findin… Continue reading OPM provides guidance to address cybersecurity skills gap

Privileged identity management set to rise through 2022

In identity management, privileged accounts pose special risks. These types of accounts generally grant higher levels of access than typical accounts. They provide high levels of access to endpoint operating systems, servers, databases, identity direct… Continue reading Privileged identity management set to rise through 2022