Last week, Trustmark National Bank and Green Bank NA, filed a complaint in Chicago federal court accusing Target and Trustwave of failing to properly secure customer data, and enabling the theft of 110 million records, including 40 million credit cards.
Steve Ragan |
03 Apr |
Read more
Each year, hundreds of vendors head to the RSA Conference in San Francisco, California, arguably the largest security gathering in the U.S. For many of those vendors, the show is a requirement, but there's a steep cost involved. For smaller companies, the show can create a sink or swim environment.
Steve Ragan |
10 Mar |
Read more
According to a recent study, security-related pressures in IT have climbed steadily year-over-year, as security professionals face the constant strain that comes with defending their organization's network and data from assortment of threats from all sides.
Steve Ragan |
11 Feb |
Read more
In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame.
Steve Ragan |
27 Jan |
Read more
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
Steve Ragan |
22 Jan |
Read more
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
Steve Ragan |
22 Jan |
Read more
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
Steve Ragan |
22 Jan |
Read more
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
Steve Ragan |
22 Jan |
Read more
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
Steve Ragan |
22 Jan |
Read more
Just before the Christmas holiday, CSO offered five strategies the help mitigate post-holiday BYOD problems. Now that employees are returning to work, shiny new devices in hand, here's some additional insight.
Steve Ragan |
02 Jan |
Read more
We recap the biggest security news from this past year
Steve Ragan |
18 Dec |
Read more
Christmas is fast approaching. Now, and after the office is back to normal after the first of the year, employees are going to return with several shiny new gadgets, along with the expectation that they'll "just work" in the corporate environment. Security will be a distant afterthought, because it's still viewed as a process that hinders productivity.
Steve Ragan |
18 Dec |
Read more
A paper released earlier this month by a group of security researchers has outlined the technical details behind a potential Computer Network Exploitation (CNE) program likely used by the U.K. Government Communications Headquarters (GCHQ) and their American counterpart, the NSA.
Steve Ragan |
16 Dec |
Read more
Horizon Blue Cross Blue Shield of New Jersey (BCBSNJ) said on Friday that nearly 840,000 member that their information my be at risk, after two employee laptops were stolen in November.
Steve Ragan |
10 Dec |
Read more
Symantec has downsized their Managed Security Services portfolio, ending support for the managed firewall and managed endpoint offerings. S
Steve Ragan |
10 Dec |
Read more