DDoS attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.
Former Secretary of State Colin Powell acknowledged using insecure email during his tenure at the State Department – but as a way to create more immediate communication among those within and outside the department.
Corporate employees who help carry out cyberattacks are increasingly being sought and are seeking criminals to hire them
It’s not enough for security pros to figure out how to protect digital enterprises from risks that can ruin the business, they must effectively sell it to corporate boards whose blessing is needed to authorize the plan, Gartner analysts told attendees at their Security and Risk Management Summit.
Recorded Future is teaming up with other security vendors to blend the threat intelligence they all gather so it’s easier for corporate security pros to connect the dots that reveal actual incidents that need attention.
D-Link is working to fix a weakness that allows attackers to take over remote control of one of its camera so they can eavesdrop, and the company is checking whether others of its products have similar vulnerabilities.
This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices.
SS8 built its network traffic-inspection and analysis platform as a tool for intelligence agencies to discover communications among criminals and terrorists but now has scaled it back for enterprises to stop data breaches.
The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral damage it would do to privacy and the security of communications systems.
A team from Google’s fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that also learns as it goes to improve its hit rate.
The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.
Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do, Security BSides Boston conference was told.
John Deere is taking the Internet of Things out into the field by developing new technologies and embracing existing ones to boost the efficiency of prepping, planting, feeding and harvesting with the goal of improving per-acre crop yields.
The Department of Homeland Security has issued an alert about a six-year-old SAP vulnerability that’s still being exploited enough that DHS deems it worthy of special note.
When the ransomware demands come in it’s really too late to come up with a good response plan, so do that as soon as you can, an Interop audience was told.