Fortinet and Palo Alto Networks have co-founded a cybersecurity consortium with the goal of sharing threat intelligence among member organizations. Learn about the group's other goals.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
A new type of POS malware known as Nemanja has been linked to retail compromises in nearly 40 countries, but researchers say it's just one of many strains likely to be identified in the coming weeks.
In the more than a month since the Heartbleed bug was announced, many organizations have made progress in mitigating the risks. Security experts highlight gaps that remain and offer remediation advice.
The arrests of more than 90 individuals for their alleged involvement in the use of BlackShades malware is a sign of progress in the global fight against cybercrime, but some experts question whether the crackdown will serve as a fraud deterrent.
More than 90 individuals have been arrested for their alleged involvement in the creation, distribution and use of BlackShades malware. The two-day roundup operation took place in 16 countries.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Timely analysis of data residing in an organization's information systems is a critical element of IT security, say Haiyan Song and Joe Goldberg of the security firm Splunk.
Third-party risks and the Fed's plans for emerging payments will be highlighted at ISMG's Fraud Summit Chicago on May 14. How banking institutions and retailers are expected to respond to new risks posed by external parties will be a focus for our keynote panel.
Card breaches at retailers such as Target and Neiman Marcus will likely be catalysts for improved cyberthreat intelligence and information sharing across the banking and retail sectors, says Mike Braatz of ACI.
"Security as a business enabler" was the mantra echoing through the recently concluded 2014 Infosecurity Europe conference in London, a message that should have been heeded by top executives at retailer Target last year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.