Dialing in Mayhem for Profit: More Targeted Attacks, Less Malware

You can count on three things these days: death, taxes and the ever-increasing, evolving nature of security threats. According to Positive Technologies’ latest “Cybersecurity Threatscape” report, cyber incidents were up 47 percent fo… Continue reading Dialing in Mayhem for Profit: More Targeted Attacks, Less Malware

Ponemon Study Finds AI Can Help Close Security Gaps

Is the tail wagging the dog? Ponemon Institute and Aruba teamed up on a survey released a few weeks ago that found artificial intelligence (AI) is the key weapon for closing IoT-era cybersecurity gaps. Ponemon surveyed 4,000 security and IT profession… Continue reading Ponemon Study Finds AI Can Help Close Security Gaps

Discovered: Modular Malware, Marap and AdvisorsBot

Researchers at threat-protection firm Proofpoint have recently discovered two similar modular malware downloaders that fingerprint systems. Marap is targeting primarily financial organizations, while AdvisorsBot has so far targeted primarily hotels, r… Continue reading Discovered: Modular Malware, Marap and AdvisorsBot

Malware Complacency: Time to Wake up

It would be easy to become inured to the multiplicity of security headlines, studies and vulnerabilities that punctuate these days in information security. This would be the wrong time, however, to allow yourself to become complacent about malware. Po… Continue reading Malware Complacency: Time to Wake up

Security Patches: Move Faster to Keep Up With the Bad Guys

You’re tired of hearing it. Most security pundits are tired of saying it. Applying and testing security patches with alacrity is one of the keys to avoiding data breaches. And it looks like that could become even more imperative. A new Ponemon I… Continue reading Security Patches: Move Faster to Keep Up With the Bad Guys

IoT Security: Glass Half-Empty or Half-Full?

A recent study by Forrester Research shows that 92 percent of infosec leaders at companies with 1,000 or more employees have internet of things (IoT) security policies in place. The same data set, however, elicits a split on whether they have implement… Continue reading IoT Security: Glass Half-Empty or Half-Full?

HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 in Lake Buena Vista, Florida. Her March 19 keynote addre… Continue reading HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 in Lake Buena Vista, Florida. Her March 19 keynote addre… Continue reading HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

Public Cloud: Security Strained by Complexity

Cloud computing is the single most important technology trend of the last 15 years, having a profound effect on many parts of IT. And as we enter 2018, cloud will emerge as a mature technology. In its report, “Cloud Computing Accelerates Enterprise Tra… Continue reading Public Cloud: Security Strained by Complexity