The latest ISMG Security Report leads with an account of FBI Director James Comey's testimony before the U.S. Congress on insiders posing a cyberthreat to the American law enforcement bureau. Also, dissecting the claim that most startups fail shortly after being victimized by a cyberattack.
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
It has been roughly two years now since the advent of the Retail Cyber Intelligence Sharing Center. How has information sharing improved cyber defenses? And how have criminals upped their game? Brian Engle of R-CISC shares insight.
A look at how top security vendors share cyberthreat intelligence leads the latest edition of the ISMG Security Report. Also, states taking up legal efforts to assure the safety of medical devices and apps sold to consumers.
Cybersecurity in the healthcare sector, which remains inadequate, could be boosted with better threat information sharing as well as improved collaboration with federal agencies, several experts told a Congressional panel April 4.
A look at experts promoting blockchain as a secure way to share cyberthreat information leads the latest edition of the ISMG Security Report. Also, how sound waves pose a threat to IoT devices, smartphones and medical devices.
Hackers have been targeting the likes of AOL and Yahoo, in part, because a certain generation of users - including many senior U.S. officials - continue to use the services to send and store state secrets. Let's make sure future generations don't make similar mistakes.
Confide, an encrypted messaging application, received a surge of attention after White House officials began using it for leaks. But a teardown of the app by two security firms revealed a raft of serious security issues.
Vice President Mike Pence used a personal AOL email account while governor of Indiana to conduct official business, and his account was hacked. Live by the private email account, die by the private email account?
The agency that enforces HIPAA is urging healthcare organizations and their business associates to ramp up their efforts to share information on cyber threats as part of a broader effort to develop more mature information security programs.
In the age of ransomware and business email compromises, email security has taken on new significance. And Zix, the email security provider, has rebranded itself to respond. Dave Wagner, Zix CEO, discusses the latest threats and defenses.
Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action and tells why he believes the U.S. is in step one of a 12-step cybersecurity program.
Dan Holden, a cybersecurity researcher and technologist, has just taken on the new role of CTO and intelligence director at the Retail Cyber Intelligence Sharing Center. What top challenges is he addressing?