Banking & Finance August 27, 2014 4.5 Million Patient Records Stolen in CHS Data Breach — What’s Next? 2 min read - Community Health Systems has reported that it was the target of a data breach, demonstrating how vulnerable the health care industry is to attacks.
Advanced Threats July 9, 2014 7 Recommendations for Defending against Advanced Persistent Threats (APTs) 3 min read - A new study reports many IT security professionals are pessimistic about their ability to reduce the frequency and severity of advanced persistent threats.
Intelligence & Analytics May 30, 2014 IDC Data Shows IBM Security Outpacing the Market 2 min read - Recent IDC data shows that IBM Security gained share, maintained leadership positions and dramatically outpaced the overall security software market.
Endpoint May 21, 2014 Future of Endpoint Protection: 3 Must-Have Requirements 4 min read - Today's rapidly evolving threat landscape requires advanced, intelligent endpoint protection to prevent APTs and zero-day attacks. Here are three must-have requirements that every organization needs in their endpoint security solution to protect against advanced threats.
Software Vulnerabilities April 25, 2014 Underground Cybercrime: Exploits for Sale 2 min read - Trusteer's security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that, according to the seller, is successful 95 percent of the time.
Advanced Threats April 15, 2014 The State of the Hack and Cyber Threat Intelligence Gain/Loss 4 min read - A recap of Kevin Mandia's "State of the Hack: One Year after the APT1 Report" keynote at RSA 2014 and "Hacking Exposed: PLA Edition" talk by Dmitri Alperovitch and George Kurtz.
CISO March 14, 2014 Mikko Hypponen at TrustyCon: Governments as Malware Authors 3 min read - Mikko Hypponen's "Government as Malware Authors" version at TrustyCon. There is a value for security professionals, researchers and leaders in the community to revive the keynotes and continue the discussion.
Advanced Threats December 5, 2013 Enterprises Need to Take Care of the Basics before Worrying about More Sophisticated Threats 3 min read - APTs Are So Tomorrow: Enterprises Need to Take Care of the Basics Like SQL Injection and Cross Site Scripting Before Worrying About More Sophisticated Threats “Step right up folks! Behold the child what has four legs! Marvel at bearded lady…
Mainframe July 26, 2013 Network Security: Is Your Intrusion Prevention System Ready? 3 min read - Intrusion prevention systems (IPS) have become one of the most critical layers in today's network security infrastructure. Although a mature technology, IPS technology must deal with an even broader and more sophisticated attack spectrum.
Data Protection July 3, 2013 FBI Warns of Increase in Spear-Phishing Attacks 2 min read - Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.