Key Insights from the CyberCrime Symposium

2016 CyberCrime Symposium: Cyber Convergence

2016-cybercrime-symposium.png

Lessons from the 2016 CyberCrime Symposium

Cybersecurity professionals get no relief. For every threat they encounter, there are hundreds more waiting to strike, or some new point of vulnerability to consider. With the IP-enabling of every... Read More

iot-internet-of-things.jpg

Managing IoT Risk: The Internet of Things is a Lot of Things

The Internet of Things (IoT) is, both literally and figuratively, a lot of things. At this point in its evolution, it’s something of a paradox. While IoT as an infosec topic pursues cybersecurity... Read More

smarter-mobile-malware.jpg

Mobile Malware’s Getting Smarter

Despite their immense popularity, ubiquity, and ability to find their way into just about any IT conversation and industry content, mobile devices haven’t attracted much interest from the attack side. Though device infections did reach a new high... Read More

cybersecurity-awareness-can-be-fun.jpg

Cybersecurity Awareness Can Be Fun and Games

Like most cybersecurity experts, Ira Winkler has a wealth of stories that illustrate how dangerous user behavior can be to cybersecurity. He’s also got something more. A modern-day... Read More

bitcoin.jpg

Don’t Blame Bitcoin for Ransomware

Though it’s been around in various incarnations for a couple of decades, ransomware is one of the hottest topics in the world of cybersecurity, and for good reason. It’s malware on the rise, thanks to its role in a growing number of successful... Read More

attribution-analysis.jpg

Cybercrime Attribution Analysis: The Cyber Who Done It

As much as cybersecurity professionals need to be concerned about insider threats, the bulk of data breaches are still the work of outside forces. "In 2015, 77.7% of all the data breaches we... Read More

demystifying-malware.jpg

Behind the Scenes: Demystifying Malware

The frequency and size of malware attacks and the havoc they wreak are generating a continuous stream of media coverage, attracting eyeballs with often shocking details of breach size. What’s often missing in news stories on data breaches... Read More

cyber-insurance.jpg

Cyber Insurance: Are You Covered?

Back in the late ‘90s, the insurance industry came out with an early cyber insurance product. As it was a product for Y2K losses, “it was a dud, and when it died, everybody thought that cyber insurance would never take off,” said Peter Foster, in... Read More

detecting-unknown-threats.jpg

What You Don’t Know: Cyber Defense Against Unknown Threats

Even with all the traditional cybersecurity defenses, breaches still occur. “So, why haven’t these traditional security products adequately protected you?” asked Jack Walsh, New Initiatives and... Read More

cyber-crime-exercise.jpg

Conducting a Cyber-Crime Exercise in a Smaller Enterprise

When we talk about designing a great cyber-crime exercise, we always say that you need eight things to make it work. That sounds like good advice for a larger company, but what if you... Read More

2015 CyberCrime Symposium: Collaboration & Information Sharing

cybercrime-symposium.jpg

Lessons from the 2015 CyberCrime Symposium

If the relentless stream of headlines trumpeting cybercrime’s latest hits reveals anything, it’s that cyber-actors are escalating their efforts. It’s not just smarter people developing better.... Read More

privacy.jpg

The Two Faces of Privacy

With cyber-threats growing by the minute, it’s easy to see why data security professionals get hyper-focused on securing their organizations against attacks and all the technologies, practices, and processes that entails. Ultimately.... Read More

the-internet-is-a-battlefield.jpg

Cybersecurity Gets Its Due

As a national correspondent covering intelligence and national security for The Daily Beast, Shane Harris spends a lot of time immersed in the world of cybersecurity. In his presentation at the 2015 CyberCrime Symposium, “The Internet.... Read More

digital-warfare.jpg

Stuxnet: Lessons in Digital Warfare for Cybersecurity Pros

Most security professionals have at least a basic understanding of Stuxnet. However, because the story behind the malicious worm used to attack Iran’s nuclear program is so complex, many.... Read More

BANK-TLD.jpg

.BANK-ing on Better Cybersecurity

Every organization stands to lose a lot when it comes to cyber-attacks, but because they’re managing customer money and operating in a heavily regulated industry, financial services institutions have their own set of challenges. They’ve got a lot at... Read More

internet-of-things-iot.png

The Job Ahead: Securing IoT

Cybersecurity professionals are already overtaxed trying to secure all the devices that make their networks hum, not to mention the multiplying user devices seeking access. Now they’re facing the exploding Internet of Things (IoT)... Read More

critical-infrastructure-cybersecurity.jpg

Framing Cybersecurity Risk Management: V.1.0

When President Obama signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” in February 2013, the National Institute of Standards and.... Read More

fs-isac-info-sharing.jpg

A Community Watch for Cybersecurity

Cybersecurity technology and legislation are integral to building a large-scale defense against cyber-threats. But if industry and government don’t collaborate and share information on threats and breaches, even the best laws.... Read More

long-road-secure-web.jpg

A Secure Web — Get There From Here

Even their names inspire fear. Heartbleed. Shellshock. Granted, the third member of 2014’s critical vulnerability triumvirate — POODLE — sounds toothless by comparison, but the cybersecurity professionals impacted by any or all.... Read More