As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
An employee of the New York state agency that investigates Medicaid fraud is being investigated after the individual allegedly sent 17,743 records to the worker's personal e-mail account.
Sony Entertainment Network will withdraw its appeal of a £250,000 fine - that's nearly $390,000 - for not taking appropriate steps to safeguard customers' personal information when hackers attacked its PlayStation Network in April 2011.
At a time of heightened cybersecurity threats, few organizations have processes for employees at all levels to report breaches. It's time for accelerated breach response, says attorney Ellen Giblin.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Angered over the Edward Snowden revelations, DEF CON says the feds should take a 'time-out' from this year's hackers' conference. But a top DHS cybersecurity policymaker says he's still invited to participate in a conclave panel discussion.
The recent firings of six workers at Cedars-Sinai Medical Center offers yet another reminder for health records snoopers everywhere: Curiosity kills your job.
Preliminary results of the 2013 Faces of Fraud Survey show institutions are still suffering big financial losses linked to ACH and wire fraud. Why are they still getting hit, in spite of investments to detect and prevent account takeover?
A new incident response publication coming from the National Institute of Standards and Technology will include guidance on how to form circles of trust - networks of IT security experts spanning multiple organizations, says NIST's Lee Badger.
Our analysis of U.S. government labor statistics shows a sizable increase in the IT security workforce. But the way the occupation is defined may have as much to do with the increase as the number of jobs themselves.
Distributed-denial-of-service attacks pose a persistent, genuine threat to all sectors. That's why we've created the DDoS Resource Center to fill the information gaps.
With data breaches becoming nearly inevitable, many organizations are looking now for new ways to reduce the costs associated with them. Here are five practical tips for how to contain breach costs.
Three class action lawsuits filed against MAPCO Express raise questions about determining the actual cost of card compromises at retailers. Experts discuss why estimating losses is difficult.
Recent DDoS attacks on banks are prime examples of the new age of ideological threats to organizations across all industries. Who are the threat actors, and how can organizations best manage risks?
Despite what's now been a two-month break from hacktivists' DDoS attacks on banks, we can expect more assaults from Izz ad-Din al-Qassam Cyber Fighters. And this next wave should concern us all. Here's why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.