Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Ten Eleven Ventures has joined a growing list of cybersecurity-focused venture capital firms raising new funds to invest in startups solving information security problems. [Read More]
Cybercriminals operating the Clipminer botnet have made at least $1.7 million in illicit gains to date, according to estimates from Symantec researchers. [Read More]
Devo Technology, a late-stage startup building technology for data logging and security analytics, has closed a new $100 million funding round that pushes its valuation in the $2 billion range. [Read More]
ReliaQuest shells out $160 million to add threat intelligence capabilities to its flagship GreyMatter platform. [Read More]
Interpol has announced the arrest of three Nigerians accused of using the Agent Tesla malware to redirect financial transactions and steal data. [Read More]
Forgepoint Capital is pumping $10 million into a startup incubated to provide incident response services to the cyber-insurance ecosystem. [Read More]
Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used by carriers in pre-installed Android System apps. [Read More]
The FBI has issued an alert to inform US colleges and universities that their credentials are being sold on cybercrime forums. [Read More]
SYN Ventures has closed a new $300 million fund and announced the addition of serial entrepreneur Ryan Permeh as full-time operating partner. [Read More]
A 37-year-old man from Nigeria has been arrested for his alleged role leading a cybercrime group. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.