When Army intelligence specialist Chelsea Manning leaked classified documents to WikiLeaks in 2010, the federal government's security clearance process served as the main defense against malicious insiders. CERT's Randy Trzeciak explains how insider threat defenses have changed since then.
India's finance minister Arun Jaitley announced plans to form a separate computer emergency response team, CERT-Fin, for the financial sector, in his union budget speech to the Indian parliament - a move that has drawn a mixed response from security experts
A report on passage by the House of Representatives of a bill aimed at toughening insider threat defenses at the Department of Homeland Security leads the latest edition of the ISMG Security Report. Also, analyzing the use of blockchain technology to secure healthcare data.
A suburban Dallas police department saw eight years' worth of digital evidence, including material for at least one active criminal case, frozen after a ransomware attack, another example of the continuing havoc caused by file-encrypting malware.
Cybersecurity strategies developed for data-centric information technology are not necessarily suitable for protecting operational technology, where availability, rather than confidentiality, is the key security concern, says Vikram Kalkat of Kaspersky Lab.
Australia wants to build a homegrown cybersecurity industry to lessen its dependence on foreign technology. The bright ideas that are generated domestically often end up commercialized by larger companies overseas, a top cybersecurity adviser says.
Blockchain, the distributed ledger technology for cryptocurrency, has the potential to improve the privacy and security of health information exchange, says Shahram Ebadollahi, vice president of innovations at IBM Watson, which is collaborating with the FDA on a research project.
FS-ISAC is collaborating with the Monetary Authority of Singapore to establish the Asia Pacific Regional Intelligence and Analysis Center to encourage regional sharing and analysis of cybersecurity information within the financial services sector. Security experts weigh in on the value of the initiative.
This edition of the ISMG Security Report debunks recent reports suggesting that Austrian hotel guests were locked into - and out of - their rooms by ransomware. Also, would a cybersecurity executive order from U.S. President Donald Trump advance the nation's existing efforts?
Facebook is aiming to make account recovery and password resets more secure with a new, updated approach that eliminates outdated weaknesses such as emailed reset links, SMS messages and security questions.
Offspring of the Zeus banking Trojan continue to spring to life. Functionally, however, security experts say most POS-infecting banking malware remains almost identical. So why aren't more organizations putting well-known defenses in place?
Fighting back against the ransomware epidemic requires making sure that a wide variety of best practices for security hygiene are in place, says Mohit Puri of security vendor Sophos Technologies, who spells out essential steps.
Nearly three years after the Heartbleed bug - and 600,000 vulnerable servers - was discovered, the vulnerability lives on. The latest scans still count 180,000 at-risk servers. Why won't this bug just die?
President Trump is reportedly preparing to issue an executive order calling for a review of the nation's cybersecurity capabilities and vulnerabilities. The pending report outlines a series of steps to be taken within 60 days of the signing of the order.
Gartner analyst Avivah Litan has long been the go-to expert for insights on fraud detection. Now she has broadened her focus to cover endpoint security and user and entity behavioral analytics. Where do these topics converge, and what insights can she share on the 2017 cybersecurity outlook?