- Today's Approach to Security is Broken
- Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks
- JP Morgan to invest £150 million on boosting cyber security
- The risks of sticking with Windows XP
Britain's brand new Computer Emergency Response Team (CERT-UK) has finally been launched, the latest and most high-profile part of the Government's long-running overhaul of UK cyber-defences.
You may arrive at some conflicting conclusions about reported cyber attacks in recent filings with the U.S. Securities and Exchange Commission by some of the largest companies in the nation.
Iran has once again been accused of being behind a huge wave of DDoS cyberattacks directed against US banks and financial institutions for at least the last six months.
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested.
Prosecutors call it the biggest identity theft bust in US history. On Friday, 111 bank tellers, retail workers, waiters and alleged criminals were charged with running a credit-card-stealing organization that stole more than $US13 million in less than a year-and-a-half.
Sign up now »
Improve the effectiveness of your security or get unique network threat discovery and remediation
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.