Security News > 2017

The recently uncovered malware known as “Triton” and “Trisis” was likely developed by Iran and used to target an organization in Saudi Arabia, according to industrial cybersecurity and threat...

Takeaway: 'Bug Bounty' Plus NDA Still Looks Like Hush MoneyThe hacker to whom Uber paid $100,000 to destroy data and keep quiet about its big, bad breach is a 20-year-old man living in Florida,...

Cybercrime Money-Transfer Schemes Increasingly Involve CryptocurrencyCybercriminals continue to rely on individuals who undertake the risky operation of moving illicit proceeds from one location...

National Protection and Programs Directorate Title Fails to Describe Its PurposeWhat does the title National Protection and Programs Directorate mean to you? It's not so clear, unless you are...

Endpoint Continues To Be a Thorn in People's SidesMost of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or...

With just a few months left until the EU's General Data Protection Regulation will be enforced, too many so-called "experts" are spreading fear and falsehoods about the regulation, says Brian...

The latest ISMG Security Report focuses on the significant changes found in the latest version of the U.S. government's Framework for Improving Critical Infrastructure Cybersecurity, commonly...

Organizations should take an "inside-out" approach to mitigating the insider threat, says Brandon Swafford of Forcepoint, who explains the components of that approach in an in-depth interview.

The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's...
