RadioShack and a coalition of 38 states have reached an agreement allowing RadioShack to sell the customer data under certain conditions.
The FTC has recommended a list of conditions that a bankruptcy court should impose on the sale of RadioShack's information assets.
Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.
Gib Sorebo used his session at RSA to discuss the Internet of Things (IoT) and its possible repercussions.
At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.
Data software company Informatica announced, on Tuesday, that it is set to be acquired by private equity firm Permira and Canada Pension Plan Investment Board (CPPIB).
IBM will investing $3 billion over the next four years to establish a new Internet of Things (IoT) business unit along with a cloud-based platform to help build IoT solutions.
Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn't always an easy decision.
A single click by your end users can lead either to a data breach or to data protection. Which would your organization prefer?
Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.
Real security analytics demands a practitioner who has direct field knowledge of computer security, proving once again that human talent is indispensable. Problem is, human talent doesn't scale.
The internet is literally crawling with bots. Millions of them scour the farthest reaches of the internet every day, indexing content, testing connections, and making the web more useful overall.
Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.
Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.
In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.
The funding will support the development of two new supercomputers.
Igor Baikalov was appointed chief scientist at security intelligence firm Securonix.
Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.
Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.
Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data.
Big Data is altering the way organizations must manage their overall IT assets and resources, reports Karen Epper Hoffman.
Many CIOs are still unsure what role governance should play in their data archiving strategy.
Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
In this month's debate, experts discuss the importance of Big Data analytics in the industry today.
As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data is destined to become our industry's greatest challenge.
It has been said that encryption simply trades one secret (the data) for another (the key). In the same way, encrypting data naturally shifts attention to that which is not protected: the metadata.
Big Data will become "The next big thing" - a critical re-evaluation and re-tooling of our analytical abilities. This is not about being able to query more data, but being able to query all data.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes