European and American diplomats are reportedly negotiating a "Safe Harbor 2.0" agreement to allow for data transfers to the United States while also addressing European privacy concerns, Reuters reported on Thursday.
Shots from around SC Congress New York 2015. The day-long event, held on October 20 at the Metropolitan Pavilion in Manhattan, featured 32 speakers, 350 guests and 32 exhibitors/sponsors.
Data that can be monetized is, simply put, a magnet for the bad guys. No matter whether your organization is big or small, if you have desirable data, you can no longer afford to wonder whether or not to invest in cybersecurity insurance.
Businesses must prioritize protecting their security keys and certificates or leave themselves open to losing customers, system outages, audit failures and possibly failing, according to a report from the Ponemon Institute.
Microsoft released a statement on Tuesday that addressed the feedback and privacy concerns of Windows 10 data collection.
The SC Magazine UK roundtable convened with several industry experts to talk about the issues surround identity and access management
Lloyds Bank data storage device stolen from an RSA data centre two months ago contains customer names, addresses, sort codes and account numbers for Lloyds' Premier Account customers who had Royal Sun Alliance emergency home cover attached to their bank account between 2006 and 2012.
Digital identities are being exploited on a routine basis by sophisticated cybercriminals, says a just released ThreatMetrix study.
After lightning struck a local utility grid, one of Google's European data centers suffered a power outage that led to "some" permanent data loss.
How you are securing your sensitive information should not be a guessing game
American Airlines denied involvement in an apparent security incident at its one-time subsidiary Sabre, but is redoubling its own security measures as a precaution.
Imperva believes cloud storage sites like Google Drive, Dropbox, OneDrive will be the next area corporations will have to defend in their on-going battle to keep their data under wraps.
Apple announced that the iOS 9 will block advertisers and other companies from scanning devices for app-download data.
Uber has updated its privacy policies to use less legal jargon, be more concise and easier to understand.
RadioShack and a coalition of 38 states have reached an agreement allowing RadioShack to sell the customer data under certain conditions.
The FTC has recommended a list of conditions that a bankruptcy court should impose on the sale of RadioShack's information assets.
Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.
Gib Sorebo used his session at RSA to discuss the Internet of Things (IoT) and its possible repercussions.
At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.
Data software company Informatica announced, on Tuesday, that it is set to be acquired by private equity firm Permira and Canada Pension Plan Investment Board (CPPIB).
IBM will investing $3 billion over the next four years to establish a new Internet of Things (IoT) business unit along with a cloud-based platform to help build IoT solutions.
Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn't always an easy decision.
A single click by your end users can lead either to a data breach or to data protection. Which would your organization prefer?
Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.
Real security analytics demands a practitioner who has direct field knowledge of computer security, proving once again that human talent is indispensable. Problem is, human talent doesn't scale.
The internet is literally crawling with bots. Millions of them scour the farthest reaches of the internet every day, indexing content, testing connections, and making the web more useful overall.
Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.
Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.
In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.
Sign up to our newsletters
SC Magazine Articles
- RSA: Cyber-security industry is "fundamentally broken", says Amit Yoran
- DOD contractors pay $13 million fine for hiring Russian programmers
- Top Priority: Federal Government must get cybersecurity right
- Cyber and real war come together in the Ukraine
- Version 4.0 of ransomware Cryptowall released, now encrypts file names