WikiLeaks withheld the source code for the CIA hacking tools. One might wonder though, what could happen if WikiLeaks did publish this code?
This week’s sensational Wikileaks revelations about CIA hacking tools has raised all sorts of questions about the US intelligence agency’s hacking arsenal. Here’s my take on the matter.
Key regulatory standards – including PCI-DSS, HIPAA, Sarbanes-Oxley and others – share common requirements when it comes to securing privileged identities
Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.
There are a number of significant changes in PCI-DSS 3.2. We’ll just take a look at the new aspects that directly affect security controls. Here are the highlights of those new requirements.
Ransomware has traditionally been targeted at careless individuals or corporations with money on hand to ensure the bad guys get paid.
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.
What’s trending in the cyber security industry? Identity Week sat down recently with Jonathan Sander, VP of Product Strategy at Lieberman Software and veteran cyber security expert, to discuss insider attacks, password security, and lessons learned from major data breaches.
When two corporate IT environments come together, IT administrators come face to face with one of the biggest IT challenges of a successful merger: privileged identity management.
The survey revealed, to no great surprise, that the majority (74%) of IT professionals work unpaid overtime each week. However, 34% reported working an average of more than 15 extra hours a week.