In an attempt to tackle cyber-security, two-thirds (70%) of IT professionals believe that hiring ex-hackers could be the solution, if they have the right skills needed to do the job.
Browsing: Breaches
The cost, frequency and time to resolve cyberattacks continue to rise for the fourth consecutive year, according to a global study by HP and the Ponemon Institute.
Cybercriminals typically steal data using a triad of techniques–malware, hacking, and tampering with hardware.
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the grid?
In an important customer announcement published yesterday, Adobe notified customers that its network had been breached, and the attackers illegally accessed information relating to 2.9 million Adobe customers
A study from Tripwire and the Ponemon Institute has revealed that many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security
London, UK (1 October 2013) – AlienVault, the leading provider of Unified Security Management™ solutions and crowd-sourced threat intelligence,
External data breaches (think: Anonymous) and internal data leaks (think: Edward Snowden) have enterprises questioning and rethinking their security programs.
Gen. Keith Alexander, head of the embattled National Security Agency (NSA), says he is willing to share cyberattack information with the private sector — an offer seen as a Trojan horse by at least one expert.
At the time of writing I’m not sure if Edward Snowden is still sitting in a Moscow transfer lounge or settling in to his “luxury apartment” in a barrio in Venezuela.