Network Security 

National Security Letters and Gag Orders: 5 Tips to Reduce Risk

To reduce your government surveillance 'attack surface' and protect customers' data privacy from U.S. government agencies, follow these five tips.

How to Conduct Internal Penetration Testing

Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.

31 Percent of Developers See Software as Greatest Threat to IoT Security

And 90 percent of IT professionals believe the influx of IoT devices creates security and privacy issues in the workplace, recent surveys have found.

5 Steps to a Better Incident Response Plan

Incident response plans have never been more important, given the growth in cyber attacks. These steps will ensure yours is ready for action.

22 Percent of Data Breaches Are Caused by Compromised Credentials

And 65 percent of companies expect to suffer a breach due to compromised credentials int the future, a recent survey found.

How to Find the Right Penetration Testing Company

A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.

Healthcare Data Breaches Expose 23,000 Patients' Personal Information

The data exposed includes names, addresses, birthdates, insurance information and Social Security numbers.

Lack of Monitoring Weakens Database Security

Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.

58 Percent of Employees Haven't Been Taught How to Use Cloud Apps Safely

And 39 percent haven't been informed of the risks of downloading cloud apps without IT's knowledge, a recent survey found.

Startup Spotlight: TrustPipe's Endpoint Security Modeled on DNA Markers

Startup founded by nCircle veterans uses approach modeled on DNA markers to identify and shut down cyber attacks.

City of Baltimore Investigates Possible Data Breach

Dozens of city employees' personal information was used to file fraudulent tax returns.

How Is EMV Transition Going?

U.S. retailers are in no hurry to transition to EMV, surveys find. What is holding them back?

FDIC Suffers Insider Breach

A former employee mistakenly downloaded 44,000 customers' personal information.

How to Get Identity Authentication Right

Identity authentication is especially important for high-value transactions, so it is important to get it right.

5 Ways Malware Can Creep into Your System

To combat malware, vectors must be secured. Start with these five malware vectors that are highly popular with hackers.

Breaches in Turkey, Philippines Expose 100 Million Citizens' Personal Data

A wide variety of personally identifiable information was accessed in both cases.

FBI Warns of Massive Surge in CEO Fraud Scams

Losses from such scams exceeded $2.3 billion between October 2013 and February 2016.

34 Percent of C-Level Executives Are Never Updated on Security Incidents

And 36 percent are only updated on a need-to-know basis, a recent survey found.

Leading New York Law Firms Hacked

A recent American Bar Association survey found that one in four law firms with at least 100 attorneys have experienced a breach.

MedStar Health Infected with Ransomware

'You can't schedule patients, you can't access records, you can't do anything,' an employee told the Washington Post.

Grand Ole Opry, Sprouts, Seagate Breached by Phishing Attacks

Thousands of employees' W-2 tax forms were accessed by attackers.

6 Ways to Make IAM Work for Third-Party Organizations

Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.

IoT Security: It's All About the Process

With IoT security, complicated dependencies demand complementary processes.

Four Hospitals Infected with Ransomware

Despite what Kentucky Methodist Hospital described as an 'internal state of emergency,' none of the hospitals paid the ransoms demanded.