Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)

If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More

FBI Offers Updated Business Email Compromise Warning, Stats (IC3)

Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payme... More

Competing Claims of Security Vendors Sow Customer Distrust (Security Intelligence)

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and peop... More

What We Learned from Verizon’s 2017 Data Breach Investigation Report (ITSP Magazine)

Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motiv... More

Cyber Espionage, Ransomware Attacks on the Rise (Verizon Enterprise Solutions)

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of t... More

ISSA-LA Information Security Summit Set for May 18-19 in L.A. (ISSA-LA)

More than 1,000 people are expected to attend the May 18-19 ISSA-LA Information Security Summit at the Universal City Hilton in Los Angeles, with IT and InfoSec executives, leaders... More

Best Defense Against Ransomware is Aggressive Offense (ITSP Magazine)

Ransomware is big money. In fact, according to the Federal Bureau of Investigation, ransomware attackers collected more than $209 million from victims in the first three months of ... More

NAB 2017: Watermarking, Securing Data and Protecting Broadcasts: A Preview of CDSA’s NAB Cybersecurity Program

The Content Delivery and Security Association (CDSA) kicks off its three-day “Cyber Security and Content Protection Pavilion” (C3830CS at the Las Vegas Convention Center) prog... More

Swimming in Security Data Without Drowning (IBM’s Security Intelligence)

How much information do you need to manage your security? Until recently, the answer was always “more.” That is changing as the sheer volume of available data grows. Today, co... More

NSS Labs Announces Web Application Firewall Group Test Results

NSS Labs has announced the results of its second Web Application Firewall (WAF) Group Test. A growing segment of the security market, WAFs employ a wide range of functions to work... More

10 Cybersecurity Myths That Must Be Busted (In Homeland Security)

Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats a... More

IT Leaders Share How They Quell Cybersecurity Attacks (CIO)

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that ... More

Why Continuous Vulnerability Assessment is Essential (Bank Info Security)

A continuous vulnerability assessment program should be baseline security requirement for all organizations, says Richard Bussiere, principal architect, APAC, at Tenable Network ... More

Pew Research: Cybersecurity Knowledge Quiz (Pew Research Center)

Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly se... More

Password Security Tips to Help You Foil Hackers (CBS News)

Details from this week’s federal indictment of Russian hackerscharged with compromising hundreds of millions of Yahoo accounts reveal that many people are still not taking rou... More

IBM, PwC Make Cybersecurity Ventures’ Top 50 Security Company List (IT Business Edge)

Cybersecurity spending is expected to reach $1 trillion over the next five years, according to the most recent Cybersecurity Ventures Cybersecurity Market Report. This has raised ... More

The Gender Gap in Cybersecurity Jobs Isn’t Getting Better (Slate)

Johanna Vazzana knew the job she’d applied for was a stretch. Vazzana, now a cybersecurity strategist working at Mitre, was interviewing early in her career for a technical c... More

Google Points to Another POS Vendor Breach (Krebs on Security)

For the second time in the past nine months, Google has inadvertently but nonetheless correctly helped to identify the source of a large credit card breach — by assigning a “Th... More

Cybersecurity in Seven Minutes (CSM)

Knowing about cybersecurity risks isn’t the same as protecting against them. For instance, a recent survey from the Pew Research Center found that just 12 percent of America... More

Study: Zero-Day Exploits Develop Quickly (Threat Post)

It takes less than a month for most zero-day exploits to be developed, and about a quarter of those previously unknown and unpatched vulnerabilities will go undiscovered and undis... More