A group of highly respected IT security thought leaders is calling on the Obama administration to exercise existing powers to strengthen the processes the federal government employs to secure its information systems.
Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST's Matthew Scholl.
Download the transcript of this interview in PDF format (sponsored by Corero Network Security)
As DDoS attacks on banks continue, institutions can take immediate steps to lessen the impact on customer experience and reduce fraud risks. Jason Malo of CEB TowerGroup offers insight....
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they defend against these attacks? Ashley Stephenson of Corero Network Security offers insights.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they...
The gut feeling many people have about their physical security hasn't quite developed in the digital world, presenting a challenge for homeland security officials, says State of Delaware Homeland Security Adviser Kurt Reuther.
Some of the biggest threats to mobile banking and payments are the ones over which institutions have no direct control. How can they mitigate these risks? Mobile banking expert Tom Wills offers advice.
A denial of service attack may pose less immediate risk than a data breach - but it's trickier to respond to, says attorney Ronald Raether. What tips does he offer to organizations targeted by DDoS attacks?