In its sixth annual survey of electronic communications compliance, compliance and ediscovery specialist Smarsh reports that financial services firms are struggling to retain and supervise the growing volume and variety of ecommunications.
Security / News
Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of $81 million from Bangladesh central bank earlier this year.
A proposal in the U.S. Senate to require smartphone OS developers and other tech vendors to break their own encryption at the request of law enforcement may be dead on arrival.
Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central bank earlier this year.
The ACLU wants a federal judge to let it join Microsoft in suing the U.S. government over the use of gag orders that prevent the technology firm from telling customers their data has been demanded
The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral damage it would do to privacy and the security of communications systems.
A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country's residents when they are stored overseas.
A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials.
A team from Google’s fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that also learns as it goes to improve its hit rate.
The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if they’re up to the task.
The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between internal domain names used inside corporate networks and domains that can now be registered on the public Internet.
Organizations that are adopting DevOps methodologies are realizing actual benefits to disaster recovering planning from taking that approach.
Apple revealed Tuesday that it rehired a security expert who has a background as a mobile encryption pioneer, as the company continues to face scrutiny from governments wanting more access to its products.
Many U.S. states aren't confident in their ability to respond to cyberattacks on physical infrastructure such as water and electric systems, some emergency response officials said.
A new ransomware program called DMA Locker has reached maturity and shows signs of being distributed in widespread attacks.
It took hackers less than two weeks to integrate a recently patched Flash Player exploit into widely used Web-based attack tools that are used to infect computers with malware.
The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.
Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do, Security BSides Boston conference was told.
Financial transaction network SWIFT called on its customers Friday to help it end a string of high-profile banking frauds perpetrated using its network.
- NEW Gigamon Transform Security Zone - Find out more now!
- APJ businesses think they will be breached: Here's why: Read the article NOW
- More than 270,000 customers worldwide trust Fortinet to protect their businesses. Learn more.
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.
- F5 Security Hub NEW Look - Try us out today!
- CMO's top 10 martech stories for the week - 27 May
- How this marketer got a traditional manufacturing business to embrace digital
- David Jones marketing chief departs; digital executive role created
- Mercer CMO: How B2B brands can achieve customer love
- Pure Storage CMO's tips to make your marketing resonate