Three U.S. banks have been targeted by new DDoS attacks that apparently had little impact. As bank defenses improve, some experts say the attackers may shift targets to other industries affecting critical infrastructure.
Organizations won't effectively share cyberthreat intelligence until they have more efficient ways of gathering and prioritizing data, says EMC's Kathleen Moriarty, author of a new report about information sharing weaknesses.
Phyllis Schneck, the next deputy undersecretary for cybersecurity at the Department of Homeland Security, comes to the job with a different set of experiences than her predecessors - and that could prove valuable.
Kim Peretti, the ex-prosecutor who helped nab Heartland hacker Albert Gonzalez, says recent indictments offer insights into the actors behind global fraud schemes that affected 160 million cardholders.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.
Cyberthreats, including distributed-denial-of-service attacks, are growing worldwide. So FS-ISAC is expanding its information sharing efforts internationally to help financial institutions counter the threats, says Bill Nelson, the organization's president.
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
When a financial institution experiences a distributed-denial-of-service attack or other cyber-attack, what details must they report to the SEC? The American Bankers Association's Doug Johnson explains.
Today's business productivity is driven by a new generation of secure mobile apps that let employees do more with their devices. By keeping workflows integrated and safe, these apps promote greater levels of collaboration and convenience in the areas of document retrieval, storage, editing, and transmission.
Malware, DDoS and mobile security aside, one of the biggest risks is organizations' lack of visibility into specific threats. Don Gray of Solutionary explains the need for actionable threat intelligence.