An insurance company in the United States is using Enhanced File Transfer (EFT) to distribute to their customers insurance documents that contain the customer's personal information, such as Social Security numbers and birth dates. EFT is integrated with one of the company's internal systems, which generates a PDF...
The stereotypical image of a cybercriminal is a malicious user actively trying to break down corporate security. In reality, most data breaches begin on the inside - and most of them are accidents. When employees use unsecured consumer cloud services, they're throwing open the gates and letting unauthorized users in...
Apple's recently unveiled ResearchKit makes it easier for patients to participate anonymously in medical research studies. But what are the privacy and security concerns?
More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers.
Large enterprises are engaging new digital business models as part of their growth strategy. Such innovation gives rise to the increase of the new "digital risk officer," says Gartner's Sid Deshpande.
In the wake of the hack of U.S. insurer Anthem, security experts say Indian businesses are also at risk from such attacks, and may already have been breached. Here's how businesses everywhere must respond.
A proposed national data breach notification bill to usurp 47 state statutes could make it easier for businesses to notify consumers of a breach. But is that worth weakening PII protections some states offer? Massachusetts plans to do battle.
The 2014 CISO Assessment evaluates the current state of security leadership and what leaders expect to face in the next three to five years. Security leaders are in the midst of an evolution. Driven by the specter of external attacks and the needs of their own organizations, they are continuing the shift toward a...
The DDoS landscape has changed considerably since 2012, leaving many organizations unprepared to deal with today's distributed denial of service attacks. Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack.
Download this toolkit to learn:
What...
Enterprises are under attack. Any business that depends on the Internet is a target for distributed denial-of-service (DDoS) attacks, which overload a network and its components, effectively shutting down the network. These attacks are more than an inconvenience - they can harm an organization's reputation or, worse,...
The ground has shifted under most enterprise IT security staff. Breaches are now capturing prime-time air across mainstream media outlets. As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet...
Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim at businesses of all sizes in all sectors, rather than consumers. That's why employee education is so critical.
Google has warned Google Apps administrators that their private Whois contact information has been exposed. The leak affects more than 282,000 administrators, and places them at greater risk of ID theft and spam attacks, according to Cisco.
Wipro is developing a new value-at-risk model to articulate and measure aggregate risk from cyberthreats. Can CISOs leverage this framework to determine and predict risk and quantify its complexity?
The Senate Intelligence Committee has passed a cyberthreat information sharing bill known as CISA, but it's unclear whether it provides liability protections for businesses and privacy safeguards for citizens that would receive White House approval.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.