Avoiding data breaches is almost impossible – so now what?

Don’t try to avoid data breaches altogether – that’s a waste of time. Nowadays, dealing with a breach is now simply part of being a security professional. Instead, focus on mitigating the damage

Published on: March 3rd, 2014 Candice So

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Published on: February 27th, 2014 Candice So

Pony malware targeting passwords and Bitcoins uncovered

Correction: The original version of this story said there were attacks on 73,000 different websites. The correct number is 93,000. We regret the error. Security researchers have uncovered a new type of malware

Published on: February 26th, 2014 Candice So

RSA keynotes tackle NSA allegations out of the gate

Updated on Feb. 26, 2014 at 7:45am ET with analyst comments from Anton Chuvakin of Gartner Inc. There’s been a lot of talk about RSA Security Inc.’s involvement with the U.S. National Security

Published on: February 25th, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Published on: February 19th, 2014 Candice So

#FollowFriday – 3 people to follow in marketing, 3D tech, and privacy

For today's edition of our #FollowFriday post, we've rounded up a list of three people whose tweets are retweet-worthy. Whether they tweet on marketing and leadership, 3D technology, or privacy and security, these

Published on: February 6th, 2014 Candice So

Securing your database is about more than just securing your network

If you run a business harbouring sensitive information within a database – anything from intellectual property, to digital cash, to your customers’ data – you need to secure it. It sounds like such

Published on: January 21st, 2014 Candice So

Obama has promised NSA reforms, but for phones, not the Internet

With U.S. President Barack Obama announcing high-level changes to government surveillance programs at the National Security Agency (NSA) earlier today, it seems as though much has been promised - but we have yet

Published on: January 17th, 2014 Candice So

DDoS attacks now coming from mobile apps, Prolexic report says

Hackers are now using mobile apps to launch distributed denial of service (DDoS) attacks against enterprise clients, according to a new report from Prolexic Technologies Inc., a security solutions provider focused on protecting

Published on: January 14th, 2014 Candice So

#FollowFriday – 3 people to follow on Twitter

Today, Twitter and Starbucks announced you can now tweet a Starbucks gift card at other users on Twitter. Sounds good, right? But before you start sending lattes left and right, you may want

Published on: January 9th, 2014 Candice So

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Published on: January 2nd, 2014 Candice So

Did the NSA Deal Fatally Damage the RSA Brand?

Secrecy is not a poor security practice as much as a compromise of integrity. EMC's RSA Security division recently made headlines when its enterprise products were expertly hacked, undermining the security of thousands of

Published on: December 23rd, 2013 Claudiu Popa

Target’s data breach exposes 40 million credit card numbers

Retail giant Target Corp. has confirmed its cash registers have been hacked, exposing about 40 million credit and debit card numbers. The thieves managed to get customer names, card numbers, expiration dates, and

Published on: December 19th, 2013 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Published on: December 17th, 2013 Candice So