The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
Two credit-card payment processors are offering to cover merchants' fines and penalties in the event of a data breach.
Compromised information networks can put an organization's very life in jeopardy. Here are ways that firms can take the lead.
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
A pharmacist wholesaler in Austria modernized its distribution systems and found protection for its network.
Miami Beach needed to quickly identify threats, generate immediate notifications and to quarantine infected computers.
A new study provides a review of the scope and impact of data security breaches in the health care industry.
Sidney Gellineau, CIO, NYC Transit, embraces the original vision of NAC - to vet unmanaged guest devices, reports Dan Kaplan.
One technologist wants the public to understand why releasing exploit code for a dangerous vulnerability is sometimes the right thing to do.
Many companies have a false sense of security when it comes to their backup measures, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Syrian Electronic Army redirects Gigya, briefly compromises media sites on Thanksgiving Day
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say