A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.
Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
The British government aims to increase uptake of five essential security controls at U.K. businesses, backed by third-party annual audits and a badge of compliance. Many government contractors must comply.
Poor Internet hygiene, not increased cybercrime, is what's really to blame for the increased botnet traffic the online world is battling, say cybersecurity experts Tom Kellermann and Rod Rasmussen.
There's good news on the Zeus Gameover Trojan and Cryptolocker ransomware campaigns: The number of new infections has become "very low," if not fallen to zero. But related attacks could quickly resurge. Learn the reasons why.
New guidance from NIST is aimed at helping federal agencies transition from a 14-year-old requirement to a new process that will assure continuously the security of their IT systems.
Law enforcement agencies worldwide took part in a coordinated operation to disrupt the Gameover Zeus botnet and seize computer servers crucial to the CryptoLocker ransomware. A Russian citizen has been indicted in connection with the crackdown.
The OpenSSL Project is receiving new funding to support its operations following the Heartbleed exploit that exposed a flaw in the cryptographic tool that's used to provide communications security and privacy online.
Fortinet and Palo Alto Networks have co-founded a cybersecurity consortium with the goal of sharing threat intelligence among member organizations. Learn about the group's other goals.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.