A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
From the moment the RSA Conference 2016 launched, speakers began debating the merits of the Apple/FBI case. Eminent cryptographers, NSA Director Mike Rogers and U.S. Attorney General Loretta E. Lynch all offered related opinions.
The impasse over whether Apple should help law enforcement open encrypted iPhones continued during a House hearing, as FBI Director James Comey and Apple's top lawyer, Bruce Sewell, didn't budge from their positions.
It's springtime in San Francisco: cue the annual RSA Conference. Here are some notable trends that have already emerged from the event, ranging from ransomware and phishing attacks to hacker self-promotion and Facebook fakery.
IT executives overwhelmingly agree that they have a fundamental flaw in their cybersecurity strategies. Research shows organizations are not protecting the technology that determines if software, devices, clouds, and applications are good or bad, friend or foe - cryptographic keys and digital certificates. This gap...
The world's economy is built on the flow, sharing, and processing of data. Before the Internet could power the global economy, trusting data to be authentic, private, and unaltered was both a core requirement and an insurmountable barrier. The solution was the use of cryptographic keys and digital certificates to...
SSL encrypted traffic is pervasive in today's enterprises and is expected to grow rapidly over the next several years. While SSL/TLS provides privacy and authentication,
it also creates a blind spot for enterprise security. Cybercriminals can use SSL to hide their exploits from an organization's security controls,...
As the first day of RSA Conference 2016 sessions wrapped up, ISMG's editorial team sat down to discuss their takeaways from sessions and interviews. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA review.
As the first day of RSA Conference 2016 sessions was set to start, ISMG's editorial team sat down to discuss the event and what to expect from it. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview in this video report.
The cyberattacks that we've seen in the healthcare sector over the past year are starting to rewrite the rules for healthcare-related businesses in a way we really haven't seen before. How are you upping your game?
A federal magistrate in Brooklyn, N.Y., unlike another judge in California, has denied a request by federal authorities to force Apple to retrieve data from an iPhone, this time in a New York narcotics case.
The Department of Homeland security sees malware provenance - which identifies the attributes of malicious codes - as a way to complement its signature-based Einstein intrusion detection and prevention systems to find malware that infects IT systems.
To the list of vulnerable, Internet-connected devices - from routers and home alarms to baby monitors and toys - now add the world's most popular electric car: the Nissan LEAF. Nissan says a full fix is forthcoming.
Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are employing archaic methods to protect themselves.
The key, says Byrnes, is to not allow the Internet to be home to organizations that seal themselves off in solitude. Sharing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.