Target will spend $100 million to equip its "REDcards" and store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans.
Businesses need to understand they will experience a breach incident and plan accordingly how they would protect the data, a panel of experts said this week at a town hall event in honor of Data Privacy Day.
Bay Dynamics, a provider of information risk intelligence solutions, launched a new portal designed to help customers identify threat patterns, trends and behaviors based on deviations from normal user activities.
According to a new report released by the World Economic Forum, failure to improve cyber security could cost the world economy trillions of dollars in economic value and lead to more frequent cyber attacks.
In its Global Threat Report, CrowdStrike identified many of the tactics, techniques, and procedures used by more than 50 different threat actor groups to craft and launch sophisticated attacks against major targets around the world.
Security really is a marathon and there are no days off. Sacrifices are needed and tough decisions are required. The motto of our country’s most elite fighting force, the US Navy SEALs, is The Only Easy Day Was Yesterday.
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
I am painfully aware that in business and in security, hope is not a plan. However, that doesn’t mean we can’t dream a bit about the best case scenario. In the spirit of the season, here are five things I’m hoping for in the security industry this year.
During the RSA Conference we heard a lot about the changing landscape of threats and how attackers are becoming more sophisticated and better funded every day. So naturally the debate ensued around whether keeping pace and ultimately closing the gap is a question of technology, spend or approach.
The worst time for an enterprise to discover a gap between what they expected and what they need is during a cyber attack. Here are five questions that enterprises should ask about actionable intelligence now, not later.