Security intelligence firm LogRhythm has launched what it calls a "threat intelligence ecosystem" in collaboration with five other security vendors, giving customers the ability to customize the information they want in their intelligence feeds.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
Patients and healthcare providers need to recognize that Web-enabled mobile health devices that fall under the umbrella of the "Internet of Things" potentially can put personal information at risk, says Intel Security executive Greg Brown.
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
As UPS Stores reveals that 51 of its locations were infected with POS malware, a restaurant in New Orleans confirms its POS system was breached using Backoff - malware about which federal authorities recently issued a warning. Experts offer analysis.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.
The breach at Community Health Systems that compromised information on 4.5 million patients was the result of hackers taking advantage of the Heartbleed flaw, according to one security vendor. Other security experts weigh in on the potential cause.
Michael Daniel explains that among his biggest challenges as special assistant to the president is fully understanding the economics and psychology behind cybersecurity, topics that few people have mastered.
You only have to look at the headlines to see that security breaches are becoming more frequent. Just recently, DataBreachToday reported that hackers had amassed over a billion Internet passwords. One reason that security breaches keep happening is that many websites continue to use simple passwords for...
Following its massive December 2013 data breach, Target Corp. continues to report drops in net earnings. In the second quarter of 2014, the retailer says its profits fell almost 62 percent.
With the clock ticking on the current legislative session, and with his retirement just months off, Sen. Jay Rockefeller is mulling whether Congress needs to enact legislation to regulate how airlines use and protect passengers' private information.
ATM manufacturers Diebold and Wincor Nixdorf are laying the groundwork for a new industry group focused on thwarting ATM crime. While experts say the time is right for a group like this, it will need industrywide buy-in to be successful.
As the Target breach demonstrated, boards of directors will be held accountable when their organizations are breached. Attorney Kim Peretti offers tips on how to educate boards about security issues.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.