Security Job #1 For Feds
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Bitcoin Heists Cause More Trouble
Attackers continue to pummel bitcoin "banks," exchanges, and crypto-currency users themselves via malware that steals virtual wallets.
Big Data Meets Threat Detection
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Labs Must Protect Newly Portable Patient Data
Now that the Department of Health and Human Services has ruled that consumers can get their medical test results, labs' IT departments must give security and privacy top priority.
Mask Spyware Outdoes Flame
Rare Spanish-speaking cyberespionage campaign uses spyware and malware tools that researchers call the most sophisticated yet.
The Problem With Two-Factor Authentication
The failure of corporate security strategies to protect personal identity information from hackers resides more with system architecture than with authentication technology. Here's why.
Yahoo Mail Passwords: Act Now
Yahoo suffers hack attack, eyes third-party database and reused credentials as likely culprits, may enforce two-factor authentication to help users recover accounts.
Target Hackers Tapped Vendor Credentials
Investigators suspect that BMC software, Microsoft configuration management tools, and SQL injection were used as hacking tools and techniques in Target's massive data breach.