Infosecurity Europe 2013: Infosec can no longer hinder business objectives
CISOs need to change their approach if they are to make their voice heard
More results...
CISOs need to change their approach if they are to make their voice heard
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, taking top (dis)honors for being behind the most breaches during the year.
Hacktivism and espionage are poised for growth, but cyberthreats will continue to follow the money.
More small firms are the victims of cyber attacks, and the cost of breaches is rising across the board, according to a PwC-BIS survey.
Advanced evasion techniques (AETs) rarely receive the full publicity they deserve – possibly because it is a term originally coined by one manufacturer (Stonesoft) to describe how attackers defeat other security manufacturers.
Chloe Smith, Minister for Political and Constitutional Reform, opens Infosecurity Europe 2013
With 288 million active users, Twitter has proven itself over and over to be a fantastic tool for spreading information and acting as a news source, especially in times of crisis.
Attack on the drones? A dozen organizations in aerospace, defense, telecom and government agencies located in the US and India are the target of an Operation Beebus campaign that goes back to at least as early as December of 2011.
It has to be accepted that in some areas security simply isn’t working – or at least it’s not working well enough. Time and again it’s discovered that a major breach has occurred, followed by a subsequent revelation that the attackers have been on the …
A new mobile malware family, the appropriately named BadNews, has been found in 32 apps across four different developer accounts in Google Play. It masquerades as an advertising network, but in actuality pushes fraud-oriented malware and other “monetiz…