The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
The FBI says it has traced the hack attack against Sony Pictures Entertainment to North Korea, and President Obama says that the United States will respond proportionately to the cyber-attack.
The Sony Pictures Entertainment hack, and the company's decision to yank the release of a film in the wake of hackers' threats, has provoked intense reactions. Read the comments and join the conversation.
The White House says that it's treating the hack attack against Sony Pictures Entertainment as a "national security matter." But it says it's too early in its investigation to definitively attribute the attacks to any particular group or nation.
Many security experts say Sony Pictures Entertainment's decision to cancel the release of the film "The Interview" following a "terror" threat made by hackers against movie theaters and theatergoers sets a dangerous precedent.
Don't take at face value the report that the U.S. government believes that North Korea hacked Sony Pictures Entertainment, numerous information security experts say, warning that hacktivists, insiders or other nations could be the culprits.
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Since the phrase "Advanced Persistent Threat" (APT) was coined nearly ten years ago, it has been the subject of extensive discussion and debate in the IT security community, attracting terabytes-worth of media buzz. The spotlight on APT's has been critical of bringing the reality of today's threats to light, but the...
Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session, we will define and describe the APT attack and defend lifecycle, provide an overview of how the day is structured and what we aim to achieve, answering such questions as:
What is...
What are the most common mechanisms used in the "Exploit" phase? Many attacks simply take advantage of known vulnerabilities or network weaknesses that have not been addressed, in which case the adversaries have no need to create custom malware. When they are employed, "zero-day" attacks are often very difficult to...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your team fail at responding is to not have them trained with well-practiced procedures and have them be overly reliant on expensive, improperly configured technology. Strike, strike,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.