North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
The FBI says it has traced the hack attack against Sony Pictures Entertainment to North Korea, and President Obama says that the United States will respond proportionately to the cyber-attack.
The Sony Pictures Entertainment hack, and the company's decision to yank the release of a film in the wake of hackers' threats, has provoked intense reactions. Read the comments and join the conversation.
The White House says that it's treating the hack attack against Sony Pictures Entertainment as a "national security matter." But it says it's too early in its investigation to definitively attribute the attacks to any particular group or nation.
Many security experts say Sony Pictures Entertainment's decision to cancel the release of the film "The Interview" following a "terror" threat made by hackers against movie theaters and theatergoers sets a dangerous precedent.
Don't take at face value the report that the U.S. government believes that North Korea hacked Sony Pictures Entertainment, numerous information security experts say, warning that hacktivists, insiders or other nations could be the culprits.
Researchers are alarmed about the increasing sophistication of crimeware-as-a-service, an underground business model that pushes adaptable malware from a botnet. How can banking institutions defend their accounts?
One day after hackers made a "terror" threat against movie theaters planning to show the upcoming film "The Interview," Sony Pictures Entertainment canceled its release.
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge...
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Since the phrase "Advanced Persistent Threat" (APT) was coined nearly ten years ago, it has been the subject of extensive discussion and debate in the IT security community, attracting terabytes-worth of media buzz. The spotlight on APT's has been critical of bringing the reality of today's threats to light, but the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.