Webroot conducted research on web security in the U.S. and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help-desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are...
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences and how IT pros are responding. Among the results: the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a...
Version 3.0 of the Payment Card Industry Data Security Standard, to be released later this year, will include a focus on the standardization of compliance assessments, says Bob Russo of the PCI Security Standards Council.
With 22 percent of its mission-critical cybersecurity-related jobs vacant, the Department of Homeland Security is under pressure to revamp the way it recruits and retains IT security experts.
While some in Congress argue about whether the Department of Homeland Security has too much cybersecurity authority, recently retired leader Bruce McConnell offers his take on why the department is playing an appropriate role.
On the one-year anniversary of al-Qassam Cyber Fighters' first announcement about DDoS attacks against U.S. banks, experts discuss what may happen next, including whether the group will join forces with the Syrian Electronic Army.
The National Institute of Standards and Technology is re-evaluating a set of its special publications because of concerns expressed by some leading cryptographers that the National Security Agency might have corrupted the guidance.
As security professionals in other business sectors prepare for potential DDoS attacks, here are three important lessons they can learn from the successful defenses in the financial services industry.
Scientists are discovering ways to make quantum key distribution a more cost-effective and efficient way to securely share encryption keys, but there's still a long way to go before the methods can be practically applied.
Even with the latest disclosures of the efforts the National Security Agency goes through to decrypt Internet communications, enterprises can take specific steps to protect their information from prying eyes.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
In his four years as a top DHS cybersecurity policymaker, Bruce McConnell learned that to build trust with the public, the federal government must be more transparent in the way it approaches security and privacy.
Today's advanced threats are no secret. Focusing the correct resources on them is the true challenge, says Will Irace of Fidelis. He offers tips for harnessing the right skills and technology.
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.
Operators of media sites should consider adoption of the cybersecurity framework in the aftermath of the recent domain name systems attacks aimed at The New York Times and Twitter.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.