The Trump administration is working to lift sanctions on the Chinese telecommunications giant ZTE despite top intelligence officials' warnings that the company poses a security risk to the US.
There are generally three 'levels' of cyber-threat intelligence: strategic, operational and tactical, which serve different functions.
Modern security operations centers need to shift from traditional SIEM-driven SOCs to Intelligence-Driven SOCs says Yitzhak Vager.
Researchers at Cisco's Talos Intelligence Group have identified a new malware family, dubbed GoScanSSH, that compromises SSH servers. Well, those not attached to government, law enforcement or military domains anyway. Note: SC Media UK will not be publishing during UK Easter holidays, resuming 2nd April 2018.
During the waning days of his administration after he'd ordered a probe into election interference, the US intelligence community reportedly told former US President Obama that Russian hackers compromised voter registration systems.
The US intelligence community reportedly negotiated in secret to retrieve classified documents stolen from the National Security Agency (NSA) by the Shadow Brokers and passed along to Russian intelligence.
More data and hack case studies should allow professionals to take a step back and place attacks into a broader context, harnessing the power of AI to learn from these breaches.
China leads the hacking charts with the highest combination of impact factors ticked off on a matrix combining the potential capability and impact of possible attacker groups, thus presenting the highest risk.
Israel is under constant threat and conscription gives its army access to its brightest students - what can the UK learn from its approach to and understanding of cyber-terrorism?
It's not just Clinton's campaign that's believed to have been hacked by the Russian state, and collusion with cyber-crime is also suspected. Beyond Russia, it is time to establish new norms for government behaviour online.
Cyber-crime requests triple in three years as international agencies seek greater cooperation to combat the threat.
A list of people suspected of links with crime and terrorism from due diligence company World-Check has been leaked online, reportedly by a former associate.
Artificial intelligence could make catching hackers more elementary but will cyber-criminals adopt the technology and could it make cyber-security professionals redundant?
The social media giant has taken a stand when it comes to intelligence agencies using the service to collect data.
A special bespoke malware seems to the at the centre of a massive cyber-fraud resulting in the theft of millions of dollars from Bangladesh Bank
ICYMI: Madison extortion, Cyber-sec challenge, United bug-bounty, French intelligence, and Anonymous/ISIS spat
The latest In Case You Missed It (ICYMI) looks at suspected Madison extorortionists, Cyber-Sec challenge finals, bug-bounty criticism, French intelligence & Anonymous' ISIS twitter battle.
Following the attacks on Paris on Friday, the French government is scrambling to upgrade its intelligence capabilities which have suffered from under recruitment.
Anonymous' campaign against the Islamic State's internet assets has been criticised as a move that only hinders security and intelligence services attempts to investigate them.
Cyber situational awareness can help protect against cyber-attacks, loss of intellectual property and loss of brand and reputational integrity, says Alastair Paterson.
The number of data breaches has continued to grow in 2015. Barely a day goes by without a company or country falling victim to a cyber-security attack, says Gary Newe.
Prioritise your assets and prioritise the actions you need to take to protect, monitor, and then remediate and recover from a data breach, said speakers at the Westminster eForum in London today.
London-specific threat intelligence is to be provided to businesses in the capital, possibly as early as next month, via an innovative independent body combining the police, government and the private sector, instigated by the Mayor's office.
Sharing of industry and government data, collated centrally to create a cyber-threat weather map is now underway in the US, with threat indicators being issued.
Cyber-espionage by newly discoverd hacking group dubbed Volatile Cedar, believed linked to a Lebanese political group, leads to hundreds of webservers getting hacked.
The US government and the IT industry continue to lock horns over encryption, despite the US president's plea for greater co-operation between government and vendors.