More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.
Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.
Multiple programs to incubate security skills to meet India's growing demand have not borne fruit. ISACA's Avinash Kadam weighs in on the skills crisis, speaking about the group's new CSX cybersecurity program.
The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.
Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.
With a majority of ATMs continuing to run on archaic WinXP platforms, questions arise around why these devices are not being built secure by design. EPS COO Prakash Joshi on ATM security challenges and developments.
Although EMV is a far more secure payments technology, it can be exploited for fraud if it's improperly implemented, warns Gartner analyst Avivah Litan. What security lessons must be learned from past EMV deployments?
CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
What's Silicon Valley secret that helps innovative startups to thrive and grow? And how does the startup ecosystem in India compare? Here is the story of Fixnix - The Silicon Valley-based GRC startup from India.
Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.
To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.
Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?
The legal climate around cyberspace is gaining maturity, with nations such as China looking at the domain as being an integral part of national security. Cyber law expert Pavan Duggal shares insight on this evolution.