• December 19, 2014 19 Dec'14

    FBI connects Sony Pictures hack to North Korean government

    The investigative U.S. government agency said it found overlap between the malware and infrastructure used in the Sony Pictures hack and other North Korean operations.

  • December 19, 2014 19 Dec'14

    Surviving the Sony Pictures hack: Is the company's future in jeopardy?

    News roundup: As it copes with a devastating, unprecedented cyberattack, Sony Pictures' future as a company could be on the line. Plus: "Operation Cleaver"; labeling HTTP websites "insecure"; and a surge in phishing with malicious links.

  • December 18, 2014 18 Dec'14

    Survey: Guest network security lacking at many businesses

    According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.

  • December 18, 2014 18 Dec'14

    Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.

  • December 17, 2014 17 Dec'14

    Sony Pictures data breach update: Hackers threaten film premiere

    The New York opening of Sony Pictures' upcoming comedy The Interview was canceled after threats emerged from the attackers responsible for its recent data breach.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • December 12, 2014 12 Dec'14

    Sony Pictures hacking back: The ethics of obfuscation

    News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

  • December 10, 2014 10 Dec'14

    Sony data breach update: Executives received extortion emails

    Among the new details uncovered this week, Sony executives received extortion emails just days before troves of the company's data were released online as part of a massive breach.

  • December 09, 2014 09 Dec'14

    December 2014 Patch Tuesday features three critical fixes

    Capping a busy year of software updates, Microsoft's December 2014 Patch Tuesday release delivers three critical bulletins; separately Adobe offers a pair of critical fixes.

  • December 09, 2014 09 Dec'14

    Many SMBs still lack controls to limit sensitive data exposure

    Trustwave says one out of every five organizations has no controls in place to prevent sensitive data exposure, despite growing criminal interest.

  • December 09, 2014 09 Dec'14

    FIDO Alliance releases 1.0 specifications for passwordless authentication

    Amid growing fears of stolen credentials and data breaches, the FIDO Alliance released its long-awaited 1.0 specifications for passwordless and multifactor authentication systems.

  • December 05, 2014 05 Dec'14

    How to find malware? It's hidden malware here, there and everywhere

    News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...

  • December 03, 2014 03 Dec'14

    Expert: FIN4 phishing attacks show new operational sophistication

    According to one expert, the FIN4 attack group's successful advanced phishing operations prove that phishing attacks can't be thwarted solely with user awareness training.

  • December 02, 2014 02 Dec'14

    FBI warning links wiper malware to Sony Pictures hack

    A confidential FBI warning circulated to U.S. businesses warns of attacks that may utilize wiper malware like that used in the Sony Pictures cyberattack.

  • December 02, 2014 02 Dec'14

    Information Security 2014: Shifts ahead after a watershed year

    Editorial Director Robert Richardson looks at the year in review and offers his take on the security blunders and breakthroughs and some lessons learned.

  • December 01, 2014 01 Dec'14

    2014 Security 7 winners announced

    This year’s honorees have worked to move InfoSec forward with contributions in secure information sharing, cybersecurity science, community building and incident response.