Even before an organization is breached, these processes should be put in place to limit damage, bolster technical defenses and help repair the brand, reports Larry Jaffee.
Cisco has embraced an "enhanced and simplified" view of vulnerabilities in its products.
By upholding three claims against Coca-Cola, a U.S. District Court in Pennsylvania lets a class action lawsuit stemming from a 2014 breach move forward.
The National Institute of Standards and Technology (NIST) unveiled two projects designed to secure email.
Data Breach Blog
Emerging Products: Cloud Security, Part 2
In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.
Questions have been raised over the security of the Microsoft Outlook Web Access (OWA) server, which "uniquely" connects protected internal systems to the internet.
In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.
Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?
The impact of Canada's anti-spam legislation for companies big and small.
Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.
Me and my job
Click here for more information.
Sign up to our newsletters
SC Magazine Articles
- FBI-issued spyware leads to arrest of child pornography suspect
- Security researcher reveals Kaspersky zero days
- Backdoor in MS Outlook webmail raises security doubts
- Stored XSS vulnerability identified in Jetpack plugin for WordPress
- Companies leaving known vulnerabilities unchecked for 120 days: Kenna