Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes, CTO at Trend Micro.
Delta is warning that a power failure lead to system outages, resulting in numerous flight cancellations or delays. As more airline-related processes get computerized, experts are asking why the airline's systems aren't more resilient.
Although they apparently weren't caused by cyber-attacks, the impacts of computer failures at the New York Stock Exchange, United Airlines and the Wall Street Journal have much in common with the aftermath of breaches.
Facebook dismisses reports that a brief Jan. 26 outage was triggered by either U.S. blizzard conditions or the hacking group Lizard Squad. The social network blames the hour-long outage on an internal, technical problem.
New comments from the CEO of Sony Pictures about the film studio's response in the aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack risks.
Enterprises need to think beyond malware, breaches and insider threats when assessing information security. Keeping hardware up and running - available - is a crucial aspect of securing essential data.
Wayne Dunn, CTO of HarborOne Bank in New England, says improving vendor management is a top security priority for institutions in 2014. As more core banking functions are outsourced, due diligence becomes increasingly critical.
Federal authorities are warning banking institutions and government agencies about a wave of DDoS attacks that could strike on 9/11. Learn what steps the FBI suggests should be taken to mitigate the threat.
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
In assessing the risk of a distributed-denial-of service attack, organizations must think beyond shoring up systems' perimeters and concentrate on analyzing cyberthreat intelligence, Booz Allen Hamilton's Sedar Labarre says.