As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
This past year saw the revelation of three massive security bugs that existed for lengthy periods of time before they were discovered. This infographic details those exploits and just how long they went unnoticed.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
How can banking institutions prepare for beefed up cybersecurity exams by regulators next year that likely will scrutinize their security awareness efforts? One federally funded training program could help.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
Leading this week's industry news roundup, Soltra, an FS-ISAC and DTCC joint venture, launches a threat intelligence platform, while Tripwire and Palo Alto Networks announce the integration of APT technologies.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
For the first time since 2010, the FFIEC has released updated guidance about Bank Secrecy Act compliance requirements and money-laundering risks. As a result, a fraud expert says banks should brace for more regulatory scrutiny in early 2015.
Has your personal information been compromised in a data breach this year? This infographic showcases incidents that have affected various sectors, from banking to restaurants, proving that no industry is safe from a cyber-attack.