The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through Congress.
Most of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or vulnerabilities for which a patch already exists. For this reason, endpoint visibility must be complete and continuous.
The latest ISMG Security Report features a special report on securing medical devices. Healthcare security leaders from the FDA, an academic medical center and a medical device manufacturer share their insights on the challenges involved.
In the latest blow to Kaspersky Lab, the U.K. government is warning that the Russian anti-virus vendor's software should not be used on computers that handle classified information. British bank Barclays has also ceased giving away Kaspersky's AV software to its customers.
The U.K.'s privacy watchdog has launched a probe after some Members of Parliament admitted they share email passwords or leave workstations unlocked. The MPs were attempting to defend a colleague who's been accused of downloading and viewing pornography on his work PC.
Finding an effective breach prevention provider is critical in order to safeguard an organization's assets. NSS Labs subjected nine cybersecurity market leaders to comprehensive, rigorous testing to determine how well each product handled current advanced threats and attack methods. All vendor products were evaluated...
This US aerospace research and development organization tackles one of the most ambitious engineering projects in the world - the design and creation of space exploration vehicles capable of transporting people into orbit.Their biggest security challenge was remaining vigilant and adapting to new threats while being...
As one of the top 20 largest providers of information technology services to the financial services industry, the company in this case study spends a considerable amount of time and resources ensuring that both its data and its customers' data is secure.
Due to the tremendous amount of time involved in detecting...
Yes, malware commonly targets the Windows operating system. But if you limit malware analysis to Windows OS, you're leaving gaping vulnerabilities, says Christopher Kruegel of Lastline Inc. Here's how to maximize your analysis.
One common limitation of malware analysis is that organizations focus too much of their...
Detecting new fraudulent online banking sites is only half the battle. Once identified, how do you prevent your end users from inputting their login credentials onto the site?
Download this whitepaper and learn:
Why traditional approaches do not shut down phishing sites in time;
How new approaches continuously...
A sustainable fraud protection system that addresses the evolving threat landscape and helps banks confirm user digital identities requires three fundamental features.
Download this whitepaper and learn how your financial institution can prevent fraud with:
Global threat intelligence;
Expert research and...
The basic goal of fraud detection is being able to uncover in real time when fraudsters impersonate legitimate users. However, to do so, one needs to be able to differentiate an account user's "normal" digital behavior from abnormal behavior.
Download this whitepaper and learn about:
Context aware identity...
Medical devices are increasingly used by cybercriminals to compromise networks, systems and patient data, says Dr. Jack Lewin of the consultancy Lewin and Associates, who's also chairman of the National Coalition on Health Care. That's why physicians should be advocates for better device security.