The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon.
SEBI has directed capital markets to develop and deploy a robust cybersecurity framework to combat cyber-attacks. Security leaders welcome the move and recommend effective controls to support the initiative.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
A federal judge has dismissed a consolidated class action lawsuit filed against Horizon Blue Cross Blue Shield in the wake of a 2013 data breach. Learn how this case compares to a suit against another insurer, AvMed, which resulted in a settlement.
Singapore-based Singtel, Southeast Asia's largest telecommunications company, has entered a definitive agreement to acquire U.S.-based managed security services company Trustwave for $810 million.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president's schedule, CNN reports.
In the first three months of 2015, the number of information security analysts in the United States grew at a much stronger pace than other occupations within the information technology sector.
Several healthcare associations have raised concerns about some of the privacy and security components of the Office of the National Coordinator for Health IT's proposed 10-year electronic health record interoperability roadmap.
The Health Information Trust Alliance is attempting to launch a study, fueled by anonymized data gathered from healthcare organizations, to get a better understanding about the severity and pervasiveness of cyber-attacks in the sector.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
The more organizations structure business and processes around online identities, the more they navigate in tricky legal waters, says attorney Tom Smedinghoff, who offers guidance.
Too often enterprises fail to adequately vet their cloud service providers, which can create security vulnerabilities, according to IT security lawyers Francoise Gilbert and Ellen Giblin.
The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.