Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Internet visionary Vint Cerf sees the development of strong authentication for the billions of devices connected to the Internet as the IT security community's next big challenge.
With organizations racing to be the first-to-market with the latest, coolest app, they are forgetting something critically important: applying security principles in the development and deployment.
On the record, security experts talk about the improvements banking institutions have made in DDoS defense, and there's no doubt they have made major improvements. Off the record, they are less optimistic.
In notifying customers of a breach, the online archiving service Evernote might have confused some customers by sending them an e-mail that contained a clickable link to be used to reset passwords - despite warning against using such links.
Bank of America confirms hacktivists' reports about a breach of a third-party service provider working with the bank to analyze public data. How did the breach occur, and what information was exposed?
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
White House Cybersecurity Coordinator Michael Daniel says diplomacy will play a key role in trying to stop cyber-attacks against American economic interests originating from overseas.
Verizon's 2013 Data Breach Investigations Report will provide an even broader picture of cybercrime. Read more about this and other news releases issued at RSA Conference 2013.
The HIPAA Omnibus Rule stresses the need for business associates to adequately safeguard patient information. What are the implications? Here's what a federal privacy officer and a consumer advocate have to say.
Most organizations are aware of the cost of a security breach. But can they quantify the loss of trust in the wake of a security incident? Jeff Hudson of Venafi discusses the value of trust.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
Your organization has been attacked or threatened, and you can trace the actor. Should you "hack back" in response? Two noted information security and privacy attorneys discuss the merits of active defense.
Today's high-profile attacks have fundamentally changed the way organizations approach incident response. What are the new essentials? Ashar Aziz of FireEye leads a panel discussion on this vital topic.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.