Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.
There are a number of significant changes in PCI-DSS 3.2. We’ll just take a look at the new aspects that directly affect security controls. Here are the highlights of those new requirements.
Ransomware has traditionally been targeted at careless individuals or corporations with money on hand to ensure the bad guys get paid.
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.
What’s trending in the cyber security industry? Identity Week sat down recently with Jonathan Sander, VP of Product Strategy at Lieberman Software and veteran cyber security expert, to discuss insider attacks, password security, and lessons learned from major data breaches.
When two corporate IT environments come together, IT administrators come face to face with one of the biggest IT challenges of a successful merger: privileged identity management.
The survey revealed, to no great surprise, that the majority (74%) of IT professionals work unpaid overtime each week. However, 34% reported working an average of more than 15 extra hours a week.
If you think about what an election is, you can see that it’s largely about data quality. Millions of people create a few pieces of data each. All that data flows through a multi-layered system and ends up being part of a very critical dataset that drives very real world matters. Is there any place where the security and integrity of information is more important?
Cyber security insurance will never pay off for the purchaser because it does not replace proper security or internal IT controls.
If the cloud becomes the primary data center, will there even be a need for a traditional IT department? A third (33%) of nearly 140 IT pros polled thought that the cloud will be the end of the traditional IT team.