AuthorDark Reading Staff

SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients

Names, addresses, phone numbers, account balances, may have been exposed.

SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients

Names, addresses, phone numbers, account balances, may have been exposed.

DNC Sues Guccifer 2.0, Russian Federation, Trump Campaign, for Election Conspiracy

DNC first hacked by Russians in 2015, according to the filing.

Free endpoint scanning service powered by Open Threat Exchange

Russ Spitler, AlienVault's SVP of product strategy, explains how security pros can leverage the community-powered threat intelligence of OTX - which sees more than 19 million IoCs contributed daily by a global community of 80,000 peers - to quickly protect themselves against emerging attacks.

Can AI improve your endpoint detection and response?

To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do exactly that.

Should CISOs Be Hackers?

Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals - including CISOs and other security team leaders - can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.

Protecting Data Anywhere and Everywhere

SecurityFirst CEO Jim Varner explains how resellers and MSPs can work with their clients to ensure that all of their business-critical data everywhere can be kept safe from attackers and readily available for disaster recovery - even as threats intensify and digital assets are dispersed across multiple clouds.

Addressing the Skills Shortfall on Your Infosec Team

Given intensifying threats and limited infosec budgets, Endgame CTO Jamie Butler suggests that security leaders deploy tools that leverage machine learning, chatbots, and other technologies to make Tier 1/Tier 2 staff much more effective at stopping even relatively sophisticated attacks.

Using Carrier Intelligence to Validate Mobile User Identity

To confidently validate the identity of mobile users without adding business-killing friction to login and on-boarding processes, Lea Tarnowski and Wendell Brown of Averon suggest leveraging the intelligence mobile carriers already have about their customers.

70% of Energy Firms Worry About Physical Damage from Cyberattacks

High-profile ICS attacks Triton/Trisis, Industroyer/CrashOverride, and Stuxnet have driven energy firms to invest more in cybersecurity, survey shows.