Despite advances by the security industry, criminals continue to break through security defenses. And attackers now realize that bigger and bolder attacks are not always better. New threat intelligence and trend analyses reveal how attackers take advantage of the gaps between the defenders' intent and action.
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
Cisco AMP Threat Grid combines static and dynamic malware analysis with threat intelligence into a single, unified solution. It integrates real-time behavioral analysis and up-to-the-minute threat intelligence feeds with existing security technologies, protecting you from both known and unknown attacks.
Organizations constantly faces security issues as the workforce, technologies, and regulations change. And, as network perimeters dissolve, security considerations and concerns change. With more devices accessing your network, is your corporate mobile device security policy adequate and effective?
NASSCOM and DSCI have launched a cybersecurity task force to help develop India as a global R&D hub. Experts question whether the sponsoring organizations have set the right agenda for this new entity.
In a landmark judgment, the Supreme Court of India struck down the controversial Section 66A of India's Information Technology Act, saying it violated the right to free speech as guaranteed by India's constitution.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
An incident involving hackers posting false "news" on The Wall Street Journal's Facebook page demonstrates again why organizations must ramp up efforts to protect social media accounts to avoid reputational harm.
A hacker who pleaded guilty to infiltrating law enforcement computer networks across the U.S. has been charged once again, this time with breaching a helpdesk company that supports companies such as Twitter.