Aug 20, 2014
Black Hat Series
There are a multitude of threat data sources used by Intrusion Prevention Systems (IPS) and anti-malware products to strengthen enterprise protections. Differentiating in this competitive almost commodity service market is a matter of numbers.
securitycurrent's Vic Wheatman speaks with Jeff Harrell,...
Aug 18, 2014
YALE NEW HAVEN HEALTH SYSTEM CASE STUDY
With an increase in cyber attacks across industries, and in particular healthcare with medical-related identity theft accounting for 43 percent of all identity thefts reported in the United States last year according to the Identity Theft Resource Center, managing risk has never...
Aug 11, 2014
BLACK HAT SERIES 2014
Hackers continue to go after the easiest target -- the branch or remote office be it a gas station, retail store, bank branch, local health clinic or the like.
Armed with the knowledge that organizations are increasingly distributed and most organizations' budgets are allocated to headquarters, a...
Aug 10, 2014
BLACK HAT SERIES
Purpose-built, specialized malware dubbed "Backoff" is being found in point-of-sales (POS) systems. At the discovery, the malware, which is gathering magnetic strip information, keyed data and more, had low to zero percent anti-virus detection rates. That meant that fully updated anti-virus engines on...
Aug 9, 2014
BLACK HAT SERIES 2014
IBM's Security Systems X-Force recommends that a shift takes place from focusing on protecting the perimeter to securing applications.
The X-Force publishes a Threat Quarterly Report that analyzes security breaches and methods used by the bad guys. Based on over one million data points, the report...