
Dialing in Mayhem for Profit: More Targeted Attacks, Less Malware
You can count on three things these days: death, taxes and the ever-increasing, evolving nature of security threats. According to Positive Technologies’ latest “Cybersecurity Threatscape” report, cyber incidents were up 47 percent for the second quarter of 2018 over the second quarter of 2017. The Positive Technologies 1Q18 report pegged the ... Read More

Ponemon Study Finds AI Can Help Close Security Gaps
Is the tail wagging the dog? Ponemon Institute and Aruba teamed up on a survey released a few weeks ago that found artificial intelligence (AI) is the key weapon for closing IoT-era cybersecurity gaps. Ponemon surveyed 4,000 security and IT professionals in the Americas, Europe and Asia. But the question ... Read More

Discovered: Modular Malware, Marap and AdvisorsBot
Researchers at threat-protection firm Proofpoint have recently discovered two similar modular malware downloaders that fingerprint systems. Marap is targeting primarily financial organizations, while AdvisorsBot has so far targeted primarily hotels, restaurants and telecommunications. Both downloaders are being use as a first-stage payload, delivering a fingerprinting module that Proofpoint suspects is ... Read More

Malware Complacency: Time to Wake up
It would be easy to become inured to the multiplicity of security headlines, studies and vulnerabilities that punctuate these days in information security. This would be the wrong time, however, to allow yourself to become complacent about malware. Positive Technologies’ recently released “Cybersecurity Threatscape” report for the first quarter of ... Read More

Security Patches: Move Faster to Keep Up With the Bad Guys
You’re tired of hearing it. Most security pundits are tired of saying it. Applying and testing security patches with alacrity is one of the keys to avoiding data breaches. And it looks like that could become even more imperative. A new Ponemon Institute study, commissioned by ServiceNow, concludes that cybercriminals ... Read More

IoT Security: Glass Half-Empty or Half-Full?
A recent study by Forrester Research shows that 92 percent of infosec leaders at companies with 1,000 or more employees have internet of things (IoT) security policies in place. The same data set, however, elicits a split on whether they have implemented the security technologies needed to support those policies ... Read More

HHS Deputy CIO Amélie Koran on Security’s Challenges
Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 in Lake Buena Vista, Florida. Her March 19 keynote address, “Are We There Yet? Getting There is Only ... Read More

Public Cloud: Security Strained by Complexity
Cloud computing is the single most important technology trend of the last 15 years, having a profound effect on many parts of IT. And as we enter 2018, cloud will emerge as a mature technology. In its report, “Cloud Computing Accelerates Enterprise Transformation Everywhere,” Forrester predicted that 2018 will be ... Read More

Capital One Debuts Beta of Critical Stack Container Orchestration Platform
Critical Stack, a division of Capital One, rolled out a beta program for its containerization management software and at least 41 Fortune 500 enterprises have signed up to take part. An application container orchestration platform, Critical Stack is designed to help enterprises manage secure containerized infrastructure at scale in the cloud ... Read More

Corporate Executives, Customers at Odds on Cybersecurity
Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute study commissioned by Centrify, only about half of the marketing and IT/security professionals polled agree that their companies ... Read More