Banks need to put their heads together to develop common and more secure methodologies says Sarb Sembhi, STORM Guidance, following operation Emmental.
A Portuguese entrepreneur is said to have developed a specialised search engine that can allow access to leaked or allegedly stolen access credentials.
A third of of ex-employees have access to company data and 9 percent have used their access privileges, says new research.
The Wall Street Journal has become the latest US media organisation to be hacked, just days after similar attacks against Vice Media and Metro US.
UK Financial Cyber Security summit sees call for cross-border and sector info sharing; cyber expenditure plans and investment in exports revealed.
Here are the five most popular articles, as read by you the reader, in the week for July 4 to 11.
But where does this leave anyone whose electronic identity has been stolen as a result of a malware infection?
Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.
The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons.
It's not enough to protect your own network, you also have to be prepared to cope with third party negligence, says Brian Foster.
This is how to secure data in the cloud
Exclusive video webcast & Q&A sponsored by Vormetric
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.