Cybersecurity isn't the most pressing issue NATO leaders face as they gather in Wales. But they'll tackle how the international alliance defends its member states against cyber-attacks. Deciding how to do that won't be simple.
Private equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed.
New point-of-sale malware known as Backoff has been linked to numerous remote-access attacks, putting smaller merchants at greatest risk. This infographic describes what you need to know about this growing threat.
The FBI and Apple are investigating the release of hundreds of celebrities' nude photographs and videos, which security researchers suspect is tied to compromises of iCloud, Dropbox or other cloud service accounts.
The price tag for resolving the data breach at Community Health Systems that affected 4.5 million patients could potentially exceed $100 million, by some estimates. But how much will cyber-insurance cover?
NIST is revising a map that links its core security controls, SP 800-53, to those published by the International Organization for Standardization, ISO/IEC 27001, to help protect data shared among government agencies and businesses.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
An investigation into a suspected breach at JPMorgan Chase suggests that attackers used highly customized malware, and exploited multiple zero-day vulnerabilities, to breach the bank's network, according to news reports. But were other banks hit?
Too many organizations fail to adequately manage and secure their SSH keys, even though the keys secure everything from file transfers and backups to patching and database management, NIST warns in new draft guidance.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.