New survey conducted by a female security pro of other female security pros dispels a few myths. For once, some good news about women in the cybersecurity field: A new survey shows that despite the low number of women in the industry, many feel empowered in their jobs and consider themselves valuable members of the […]

by

By Elizabeth Snell August 04, 2017 – HITRUST and Trend Micro have partnered together in an effort to further advance cyber threat information sharing and the cyber threat management process, according to a HITRUST release. The HITRUST Cyber Threat Management and Response Center will help organizations at various levels of cybersecurity maturity increase their ability to […]

by

When the Kronos malware was first advertised in underground Russian forums in 2014, the asking price of $7,000 indicated that the selling of malware was a lucrative business. Kronos was promoted as a hacking tool that could retrieve data including user names and passwords, A.T.M. PINs, and personal information useful in cracking security questions. Earlier […]

by

Remember how much digital ink we’ve spilled talking about how bad modern cyber security is? Well! Now Congress is actually (maybe!) going to do something about it. The Internet of Things Cyber Security Act of 2017 is a bipartisan bill put forth by US Senators Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden D-OR, and […]

by

In the past two years, companies all over the world spent $157 billion on information security products. For comparison, the total expenses of the state government of New York amounted to $150.7 billion in 2016.  Shutterstock Just for our amusement, let’s imagine a silver bullet with a cost comparable to information security expenses. It would weigh 302.5 […]

by

At least three cyber espionage campaigns and several malware samples in recent months have employed ancient technique, Kaspersky Lab says. In a potentially worrisome trend for enterprises, threat actors have increasingly begun using the ancient technique of steganography to conceal data theft and other malicious activity on compromised systems. Steganography is a term that describes […]

by