• February 12, 2016 12 Feb'16

    Uncertainty over Privacy Shield as Facebook faces penalties

    Roundup: Details are uncertain for the EU-U.S. Privacy Shield framework, as Facebook is charged with privacy violations in France over the use of the now-illegal Safe Harbor framework; more news.

  • February 11, 2016 11 Feb'16

    IRS hack leveraged stolen Social Security numbers

    An IRS hack has compromised thousands of tax returns, and the attack was made possible through the use of stolen Social Security numbers.

  • February 10, 2016 10 Feb'16

    Congress Republicans rebuff Obama cyber budget effort

    Obama ups spending by 35% in the 2017 cyber budget, adds a federal CISO and pushes multifactor authentication, but still faces stiff Republican opposition in Congress.

  • February 09, 2016 09 Feb'16

    February 2016 Patch Tuesday: IE Flash vulnerabilities get a bulletin

    Microsoft's February 2016 Patch Tuesday release goes after Adobe Flash vulnerabilities and more Windows Journal flaws.

  • February 09, 2016 09 Feb'16

    Social engineering attack leads to leaked info on 20,000 FBI agents

    A hacker took advantage of insufficient authentication protocols within the DOJ to perform a social engineering attack, resulting in leaked info on 20,000 FBI agents.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • February 05, 2016 05 Feb'16

    Researchers offer motive behind China cyberattacks

    Roundup: A new report may explain China's cyber targeting of health insurers. Plus, malware activity shows a big rise at year-end; more software vulnerabilities were reported.

  • February 04, 2016 04 Feb'16

    Former CIA/NSA director Hayden supports strong encryption

    Former CIA and NSA director General Michael Hayden came out in favor of strong encryption but representatives in Congress and the Senate are continuing to pursue encryption backdoor legislation.

  • February 03, 2016 03 Feb'16

    Costly government cybersecurity system needs major changes

    A new report on the EINSTEIN government cybersecurity system concluded that it is only 'partially meeting its stated system objectives,' and needs some major changes.

  • February 01, 2016 01 Feb'16

    Threat defense, hybrid clouds and 'connections others miss'

    We often talk about shifts in information security from advanced threats to emerging technology defenses, but this year marks a few major turning points.

  • February 01, 2016 01 Feb'16

    Security attack? 2016 defenses focus on damage control

    What methods are attackers using to find vulnerabilities in corporate networks? Are these security attacks really advancing? We look at the latest hacking techniques and find out from top security researchers how malware and advanced cyberthreats ...

  • February 01, 2016 01 Feb'16

    Harvard report: Metadata means there is no 'going dark' for the FBI

    A new report from Harvard said data 'going dark' in the face of strong encryption shouldn't be a problem for law enforcement and intelligence agencies.

  • February 01, 2016 01 Feb'16

    IoT security issues unplugged

    A new ecosystem is needed for the Internet of Things and machine-to-machine communications, say thought leaders. But where does that leave security?

  • February 01, 2016 01 Feb'16

    Readers' top picks for DLP products

    The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments.

  • January 29, 2016 29 Jan'16

    Deadline looms for Safe Harbor framework successor

    Roundup: As the deadline looms to replace the Safe Harbor data-sharing framework, the U.S. and EU continue to make progress; Senate is ready to vote on the Judicial Redress Act.

  • January 29, 2016 29 Jan'16

    OpenSSL patch fixes encryption flaw and strengthens Logjam defense

    A new OpenSSL patch fixes a severe encryption flaw and strengthens the protocol against the Logjam vulnerability.