President Obama delivers cyber security remarks at Stanford


Earlier today, President Obama delivered remarks at the Cybersecurity and Consumer Protection Summit at Stanford University. During his speech, he also signed an executive order promoting information sharing on cyber security threats between the private sector and government agencies. “This is not a Democratic issue, or a Republican issue,” he said during his speech. “This is not a […]

Obama to discuss cyber plans


  In our increasingly connected world, the reality of dangerous cyber threats is intensifying, and the U.S. government plans to take action. According to a release from The White House’s Office of the Press Secretary, President Obama wants to build upon steps he has already taken — including his BuySecure initiative, launched last year — […]

Report: More than 88 percent of cloud apps not enterprise ready

CLOUD Report

Compromised credentials are frequently being used in enterprise cloud apps, putting sensitive business information at risk, according to a report released today by cloud app analytics company Netskope. The report says as many as 15 percent of corporate users have had their account credentials stolen. Since many users reuse the same credentials across multiple accounts, […]

IBM study shows fewer, but more efficient, cyber attacks in 2014


The number of cyber attacks against U.S. retailers dropped 50 percent in 2014, but the increasing sophistication and efficiency of the attacks kept the number of records stolen near record levels, according to findings released yesterday by IBM. IBM’s research shows attackers obtained more than 61 million records in 2014. That represents a decrease from […]

FBI seeks special agents with cyber skills to combat online crime


After a slew of cyber attacks in 2014, the FBI has taken notice and is seeking out experienced cyber professionals to join their team, according to a report in the Chicago Tribune last week. The job post lists a variety of potential assignments, including investigations of cyber-based terrorism, computer intrusions, online exploitation and major cyber […]

New report predicts rise in targeted attacks, online banking crime


In a new cyber crime report released last week, IT security provider Trend Micro makes a number of predictions for 2015 and beyond, including a rise in targeted attacks and an increase in the severity of online banking and other financially motivated attacks. “The growing risks online banking threats pose should motivate individuals and organizations alike […]

Home Depot provides update on data breach investigation


Home improvement retailer The Home Depot, which revealed in September that its payment data systems had been breached, has disclosed additional information related to the company’s recent hacking incident. The findings are the result of investigations in cooperation with law enforcement and third-party IT security experts. The big revelation in the latest update is that, in addition to credit card data, […]

Andrew Borene Appointed to Chair 2015 Cyber Security Summit

CSS 2014 Logo

The 2014 Cyber Security Summit is less than two months away and will contain more actionable takeaways for attendees than ever before. (View this year’s agenda here.) However, with cyber threats showing no signs of slowing down, plans are already well underway for the 2015 Summit, beginning with today’s announcement of the 2015 Summit Chair: […]

Russian cyber theft results in more than 1 billion stolen credentials


This week marks yet another historic moment in cyber breaches: Security researchers say Russian hackers have stolen 4.5 billion records, gathered from more 400,000 websites, with 1.2 billion of these credentials appearing to be unique and belonging to over half a billion email addresses. This dwarfs the number of individuals affected by the Target data […]

USB ports can provide easy access points for cyber criminals

USB Devices

With new reports of data breaches seemingly occurring on a monthly basis, companies are regularly encouraging users to change their passwords to protect personal and financial information. The most recognizable methods of attaining this information are keyloggers, phishing scams, Trojans, and more recently the Heartbleed bug, which may still pose a threat to users who assume that […]