In another push for national breach notification legislation, Attorney General Eric Holder is calling on Congress to create a standard in the wake of breaches at Target Corp. and Neiman Marcus.
Advanced, ever-evolving threats call for security solutions vendors to counter with equally advanced and sophisticated solutions. JD Sherry of Trend Micro discusses new strategic alliances and product sets dedicated to creating new measures of threat defense.
Would determining ahead of time which controls should be examined in an information security audit help the federal government - or for that matter, any organization - better identify vulnerabilities across the enterprise?
Neiman Marcus has revised downward its estimate of the number of payment cards compromised in its breach last year. Company CEO Karen Katz offers new details.
Two critical steps that banking institutions need to take in 2014 to help prevent fraud are implementing big data analytics and adopting far more sophisticated customer and employee authentication, says Gartner analyst Avivah Litan.
As the only Diamond Media Sponsor at RSA Conference 2014, Information Security Media Group's coverage will be extensive. Check out what's in store during this world-class security event.
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks, outlines steps merchants, banks and others should take to secure their networks.
Because of concerns of possible National Security Agency meddling with its cryptographic standards, NIST has issued a draft report proposing revisions in how it develops cryptographic standards.
The University of Maryland has confirmed a "sophisticated computer security attack" against a database containing almost 310,000 records of current and former students, faculty, staff and others.
Leading this week's industry news roundup, IBM introduces forensics software designed to retrace actions of cybercriminals. Also, ThreatMetrix announces frictionless context-based authentication, and more.
Distributed generation and plug-in motor vehicles are among the emerging security challenges to the smart grid. In an RSA 2014 preview, Gib Sorebo of Leidos discusses the threats to utilities and consumers.
Lawsuits that card issuers have filed against Target to help recoup expenses associated with the retailer's breach aren't likely to reap big rewards, two legal experts say. But they are sending a strong message.
Many security incidents that affect the nation's critical infrastructure go unnoticed due to a lack of sufficient detection or logging capabilities, according to a new report, which calls for enhanced monitoring and reporting of incidents.
The Pentagon continues to work to fix network vulnerabilities nearly a half-year after attackers - reportedly from Iran - breached the Navy Marine Corps Intranet.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.