Rogue applications designed to impersonate a company's corporate brand are increasingly prevalent, offering attackers an easy way to fool online users into downloading malicious apps aimed at compromising credentials, says Arian Evans of the online security firm RiskIQ.
To better secure enterprise networks, as well as detect and respond more rapidly to data breaches, businesses need to know the who, what, where, when and why of all endpoints that connect to network resoruces, says ForeScout's Sandeep Kumar.
Federal regulators have hit a small Denver pharmacy with a $125,000 penalty for a 2012 breach involving improper disposal of paper patient records. It's the second such HIPAA-related penalty within a year tied to improper records dumping.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.
Automating processes could help organizations tackle the shortage of cybersecurity practitioners by making the job of analyzing threats simpler and more efficient, says Jessica Gulick, a vice president at security provider CSG Invotas.
As organizations move toward storing and processing more data on the public cloud, security needs be automated and based on sound policies to mitigate growing threats, says HyTrust President Eric Chiu.
To secure the growing number of devices being used within enterprises requires organizations to be sure they're providing the right access to the right resources for the right people, says Ping Identity's Nat Klassen.
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at software provider CA Technologies.
(ISC)Â² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
Not all threat intelligence is created equally, says Fortinet's John Maddison. And it's not just external threats organizations should be most concerned about. Why more businesses need to focus on inside-out security.