Every year, information security professionals flock to San Francisco for the annual RSA Conference. From the debut of "Trumpcryption" to cybersecurity's "greatest hits" set to hip-hop violin, here are some of the 2017 event's highlights.
As financial organizations launch new digital services and work to deliver better customer experiences, cybercriminals are finding new ways to circumvent security measures-an issue that can ultimately impact the success of digital transformations.
In fact, malware tactics have evolved to incorporate a wide range...
Old-school cybersecurity approach has proven to be futile, and many organizations and high-profile events-including the recently convened G20 Summit-are opting for the new approach because of the vulnerabilities that have been exposed by recent, high-profile attacks.
Advanced threats are multilayered and...
The honeymoon period for smaller players in cybersecurity is nearing an end, predicts Trend Micro CTO Raimund Genes. Achieving profitability has proven to be challenging for startups, while more established companies are thriving, he contends.
Megaupload Founder Kim Dotcom plans to appeal a New Zealand High Court ruling that found him and three colleagues eligible for extradition to the U.S. The four men are charged with profiting by allowing the trade of copyright-protected content on their file-sharing platform.
Amidst the increasing security chaos facing individuals and organizations, one of the dominant themes at this year's RSA Conference was the need for information security professionals to do more, bringing order to enterprise IT security as well as by influencing public policy.
This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012. Rich Bolstridge of Akamai Technologies tells how the definition of "adequate cybersecurity" has also shifted.
Brigadier General (retired) Gregory Touhill was the first federal CISO of the United States. Fresh from that role, he opens up on the state of federal cybersecurity and what the new administration should do to enhance protections.
Are there rules in cyberspace? There aren't many, but Microsoft is proposing a "Digital Geneva Convention" that would set some internet norms for countries to help prevent unfair targeting of civilians.
U.S. Rep. Michael McCaul says Washington must accept that we are losing on the global cyber battlefield. But the Homeland Security Committee chairman contends the Trump administration has the opportunity to turn the tide by prioritizing cybersecurity and investing the right resources in partnerships and defense.
While PCI DSS compliance is an important piece of the security checklist, it's not enough to protect retailers from sophisticated Cyber-attacks that fall outside of the cardholder data environment (CDE).
With more sales traffic over more channels than ever before, hackers have more opportunities to launch advanced...