- AT&T hacker Weev released from prison after appeals court overturns conviction
- Symantec draws new security picture
- Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA
- JP Morgan to invest £150 million on boosting cyber security
- Confirmed: hackers can use Heartbleed to steal private SSL keys
Edward Snowden's revelations about the National Security Agency's data collection practices have eroded the public's trust in major technology companies -- and in the Internet, a Harris Interactive survey found.
Courts have generally tended to dismiss consumer class-action lawsuits filed against companies that suffer data breaches if victims can't show that the the breach directly caused a financial hit.
President Obama's proposals to reform the National Security Agency's surveillance practices reflect the enormous challenges the administration faces in finding the right balance between national security needs and privacy and civil rights concerns.
The Internet Security Alliance, a multi-sector trade association, wants to know what adoption of a new cybersecurity framework will entail for companies in critical infrastructure industries
A movement to stop or regulate the development of so-called 'killer robots' got international backing at a meeting of the United Nations this week.
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.