Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka 5 discusses how to mitigate third-party risks.
An anti-American hacktivist group calling itself Anonymous Ukraine has posted more than 7 million credit card numbers online, but it appears unlikely most of them could be used for fraud, according to the cybersecurity firm Risk Based Security.
(ISC)Â² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth?
Palo Alto Networks announces it will acquire the Israeli-based cybersecurity firm Cyvera, continuing the recent trend of mergers and acquisitions among cybersecurity vendors. Find out how much the deal is worth.
Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.
Speculation surrounding the cause of the disappearance of Malaysia Airlines Flight 370 hasn't included the possibility of a cyber-attack. But one cybersecurity expert contends hacking an airliner is feasible.
Umpqua Bank is the latest U.S. banking institution to file a class action lawsuit against Target Corp. But what makes this suit stand out from the crowd of litigants? Two attorneys offer their insights.
Yi-Kai Liu, a computer scientist at NIST, explains how he's attempting to use quantum physics to devise a way to create a one-shot memory device that could help secure, for example, transactions or administrative passwords.