Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
In the 13th HIPAA enforcement action this year, federal regulators have slapped the University of Massachusetts Amherst with a $650,000 financial settlement and corrective action plan after investigating a relatively small 2013 breach involving a malware infection at a campus speech and language center.
So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
In an environment where 60 percent of attacks do not involve malware, it is clear that conventional malware-based protection is no longer sufficient for stopping the advanced techniques employed by today's most sophisticated adversaries.
Find out how successful attacks targeting high-profile government and...
U.K. Chancellor Philip Hammond used the launch of Britain's new five-year National Cyber Security Strategy to trumpet the country's strike-back capabilities. But other parts of the strategy - including more automated defenses - hold much greater promise.
The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
With comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.
As cyberattacks on healthcare entities continue to surge, federal regulators are urging organizations to safeguard network-attached storage devices and other gear that supports or enables file transfer protocol services.
Information security weaknesses that a watchdog agency found at the FDA are similar to those found at many healthcare organizations, some security experts say. But the FDA should be held to an even higher standard than the organizations that implement FDA-regulated drugs and devices, they argue.
There are a wide variety of known security issues with printers and other peripheral devices. This report from Red Tiger Security shows how these devices can be exploited—and how to protect yours from threat.
Read this report to learn why:
Printers and embedded devices are often the weakest link in IT...
This research report from the Ponemon Institute provides an in-depth look into the security risks created by insecure printers and other devices, with a focus on strategies and best practices that can address these risks.
This report reveals why:
53% of IT managers realize printers are vulnerable to cyber...
Through extensive research and interviews, IDC was able to better understand the quantitative and qualitative of an organization's use of enterprise security solutions—and the business value of deploying a print security solution.
See the results.
This whitepaper explores why:
80% of companies indicate that...
Right now, it is almost certain that more than 25% of the third-party apps connected to your corporate environment are considered "high-risk." When there is no longer an identifiable network perimeter, securing your company's IP can be a lot of pressure.
That's where Cloud Access Security Brokers (CASBs) come in. A...