The defendants are accused of obtaining more than 1,000 stolen credit and debit card numbers from hackers and carding websites, then making $2 million in unauthorized purchases.
A malicious app, known as mToken, has infected more than 2,000 mobile devices and intercepted at least 25,000 SMS messages, researchers found.
The National Cybersecurity and Critical Infrastructure Protection Act of 2013 was introduced Wednesday in a bipartisan effort by four lawmakers.
CA DataMinder Classification “discovers and classifies sensitive structured and unstructured content stored within file servers, databases, collaboration tools and storage repositories.
The central theme here is GRC (governance, risk and compliance). GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
Data protection is, of course, a rather large group that covers a lot of territory and encompasses a variety of tools and services.
With this year's holiday season here, online retailers should be focused on preparing their networks for increased traffic as well as protection from cyber threats.
A strong cyber threat intelligence program should include proactive analysis of network traffic, testing of theories based on our understanding of human behavior.
Our big event in Chicago once again brought in some of the most respective professionals in the security industry. Here's a brief look at some of the action that took place in the Windy City.