May 11, 2016
Representatives in Congress have received a ransomware warning following an increased number of attacks perpetrated via phishing schemes.
April 26, 2016
The 2016 Verizon DBIR skimps on data breach analysis and instead focuses on common issues, such as phishing, vulnerability management and access controls, which are still befuddling IT pros.
March 29, 2016
Krebs on Security reports 1.5 million customer contact records were swiped from Verizon Enterprise Solutions and offered for sale on Dark Web; customers are at risk for phishing attacks.
March 16, 2016
Research has uncovered ransomware attacks that begin with a sophisticated phishing campaign hitting users around the globe.
Phishing Get Started
Bring yourself up to speed with our introductory content
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud. Continue Reading
Complying with PCI penetration testing mandates has always been a challenge for enterprises. Expert Kevin Beaver discusses the recently released PCI SSC pen testing guidance and how it can help enterprises overcome their PCI woes. Continue Reading
Expert Ed Tittel offers an overview of Symantec DeepSight Security Intelligence service, which provides organizations with information and alerts on today's IT threats. Continue Reading
Evaluate Phishing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Latentbot malware has layers of obfuscation that makes it hard to detect. Expert Nick Lewis explains how its process works, beginning with a phishing email, and how to stop it. Continue Reading
Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael Cobb explains the potential threats. Continue Reading
CIOs offered advice at HIMSS 2016 on best practices and technologies to help identify and protect against healthcare cybersecurity vulnerabilities. Here's what they had to say. Continue Reading
Learn to apply best practices and optimize your operations.
An expert offers strategies for securing mobile devices in healthcare settings, including restricting BYOD, personalized training for physicians and ransomware protection tools. Continue Reading
It's safe to say HIPAA breaches should be avoided at all costs. One CISO discusses the technology most likely to cause a breach and what to do to ensure compliance. Continue Reading
Email attacks are inevitable, so supporting incident response policies and procedures is necessary to ensure your enterprise is adequately prepared for an attack. Continue Reading
Problem Solve Phishing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Address bar spoofing attacks can be detrimental to an organization. Expert Michael Cobb details several vulnerabilities and explains how to defend against the threat. Continue Reading
In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning. Continue Reading
Lethal threats to enterprise information security are emerging from every which way. This ISM Insider Edition looks at what security professionals are up against: state-sponsored attacks, the rise of hacking via social media, and the spread of small, relatively autonomous devices with sensors and networking chips.
Besides the need to watch out for attacks from China, North Korea and other nations, today’s security pros must beware of the individual hacker, who has become more potent. Blended threats and improvements to man-in-the-middle exploit kits have made malware more available to less-skilled cybercriminals who can now launch drive-by attacks with just a few mouse clicks. Continue Reading