If presidential candidates don't have the technical know-how to take an educated stand on whether tech companies should provide the government with a backdoor to encryption, how can we judge if they'll make the right choice if they get elected?
Security requirements are still stalling the broader adoption of cloud applications. Organizations need to be able to see, control and monitor cloud application usage to help protect against cloud-delivered threats, policy violations and risky user behavior. One of the key challenges is that on-premises security...
A new report from security firm FireEye that says the mobile banking Trojan dubbed SlemBunk is rapidly becoming more sophisticated illustrates why mitigating mobile malware risks must be an urgent priority for banks this year.
New proposed FDA cybersecurity guidance is an important step in getting medical device manufacturers more focused on the risks posed by their products as they're used in healthcare settings, security experts say.
In 2013, Apple introduced Touch ID, a biometric technology that brought convenient fingerprint recognition to a mass consumer
audience. Banks have gravitated to Touch ID
because it provides them with a device-based technology
they may leverage to secure the mobile banking platform, and,
in turn reduce their costs...
The FBI is investigating the point-of-sale malware breach at hotel chain Hyatt, which says related infections stretched for four months and affected 250 hotels worldwide. But Hyatt has yet to reveal how many customers or payment cards were compromised - or how attackers got in.
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture,...
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud...
Microsoft has patched a new, critical remote code execution vulnerability affecting all versions of Internet Explorer, but it's now only supporting and patching IE 11 and Edge. Potentially, several hundred million users of old IE versions are now at risk.
One of the most dangerous myths about malware is that hackers aren't targeting smaller healthcare entities, says security researcher Lysa Myers, who offers mitigation insights for clinics and others.
Tracing bitcoin transactions, some security experts suspect multiple gangs have each amassed more than $1 billion, making them the equivalent of "unicorns" - a term venture capitalists apply to extremely successful startup firms. In case there was any doubt, cybercrime really does pay.
Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are living in the medieval times of cybersecurity. How can they avoid slipping into the Dark Ages?
The key, says Byrnes, is to not allow the Internet to be home to organizations that...
Networking vendor Fortinet refutes a researcher's assertions that there is an SSH "backdoor" in the FortiOS firmware that runs its devices. Many experts say that while the patched flaw looks unintentional, it might still serve as a backdoor.
The discovery of a serious remote code execution flaw in Trend Micro's consumer security software - now patched - is a reminder that even security software has code-level flaws. But shouldn't security vendors be held to a higher standard than others?
Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.