Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

Brad Antoniewicz cisco
trump sign immigration eo

Why is incident response automation and orchestration so hot?

Manual processes limit incident response efficiency and effectiveness, driving the need for incident response automation and orchestration.

IBM's position on Security Analytics and Operations (SOAPA), part 2

Marc van Zadelhoff, general manager of IBM’s security division, discusses SOAPA requirements, intelligence and scale.

10 phishing

How to avoid falling for the W-2 phishing scam

The W-2 scam provides another example of how a security awareness program that adapts to trending threats has an advantage over a one-size-fits-all plan.

IBM's position on Security Analytics and Operations (SOAPA)

Marc van Zadelhoff, general manager of IBM’s security division, talks SOAPA market demand and evolution of the architecture.

1 integrated workloads

Well-funded doesn't mean well-secured

Being able to buy security products doesn't mean your business is secure. You need an integrated, security technology strategy.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

wikileaks

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Cybersecurity

Basic training: Cybersecurity lessons inspired by an opportunistic developer

Five foundational cybersecurity best practices for keeping up with "on-demand, near real-time" data needs

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

Cybersecurity skills shortage holding steady

Nearly half of all organizations report a “problematic shortage” of cybersecurity skills in 2017.

kaspersky logo flag

Researchers link Middle East attacks to new victim in Europe

Kaspersky Labs announced new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudia Arabia to a new attack against a target in Europe

Legislation of privacy security keyboard law legal gavel court ruling

US DOJ drops child porn case to avoid disclosing Tor exploit

The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather...

ransomware smartphone mobile

Ransomware attack hit Pennsylvania Democratic senators

The ransomware attack on the Pennsylvania Senate Democratic Caucus locked 16 Democratic senators out of their computer network.

Security alert overload threatens to bury security teams

Enterprises can’t keep up with security alert volume, struggle to prioritize the right alerts and ignore a large percentage of the security alert total. They need help!

script attack

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

01 respond attack

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software...

merger palo alto light cyber

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are moving around looking for ways to carry out exploits.

globe flags

Global cybercrime prosecution a patchwork of alliances

Global efforts to combat cybercrime are built on a patchwork of alliances, taskforces and personal relationships.

Load More