Criminals, hacktivists and hostile governments understand that the quickest way to corporate data is through mobile workers' unsecured endpoints.
Cyber criminals targeted mobile devices at unprecedented rates in 2012, exploiting the weakest link in the corporate network to steal enterprise information. For the first...
For the fourth consecutive year, Information Security Media Group will be a Platinum Media Sponsor of the RSA Conference. And for the fifth straight year, ISMG editors will host staged sessions at the event.
In recent months the Dell SecureWorks Counter Threat Unit has found that the healthcare industry is particularly vulnerable to advanced threats, with many of the most prevalent malware tools used by Advanced Persistent Threat (APT) groups affecting the healthcare industry at a rate comparable to or greater than its...
Two more cases of identity theft at hospitals shine a light on how patient information can be stolen to commit fraud. But healthcare organizations can take steps to help prevent these kinds of breaches.
A full 60% of organizations haven't done the basics.
Read this ESG Brief, Advanced Malware Protection Must Extend to Incident Detection and Response, and discover:
How your organization's incident response steps stack up
Why 'stop the bleeding' approaches are inadequate
A 5-step process to enhance your...
Throughout 2013, security professionals will continue to face evolving mobile security challenges, says Javelin's Al Pascual, who, in a new report, analyzes the changing mobile threat landscape for the year.
It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.
Two new insider fraud cases showcase the challenges organizations face to detect and prevent crimes by trusted employees. "You need IT controls, but you need more than IT," says researcher Randy Trzeciak.
In the last few months, major U.S. banking institutions have been victims of a powerful wave of distributed-denial-of-service attacks that combine three different attack tools. These "Triple Crown" attacks take DDoS to a whole new level. How can institutions improve their defenses?
Join this session for expert...
If your employees are spending personal time online during work hours at a typical rate, you could actually be paying the equivalent of six employees' salaries a year for nothing. And that's just the tip of the iceberg when it comes to how employees can take their own companies down financially. Fraud, harassment and...