The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
Two credit-card payment processors are offering to cover merchants' fines and penalties in the event of a data breach.
Compromised information networks can put an organization's very life in jeopardy. Here are ways that firms can take the lead.
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
A pharmacist wholesaler in Austria modernized its distribution systems and found protection for its network.
Miami Beach needed to quickly identify threats, generate immediate notifications and to quarantine infected computers.
A new study provides a review of the scope and impact of data security breaches in the health care industry.
Sidney Gellineau, CIO, NYC Transit, embraces the original vision of NAC - to vet unmanaged guest devices, reports Dan Kaplan.
One technologist wants the public to understand why releasing exploit code for a dangerous vulnerability is sometimes the right thing to do.
Many companies have a false sense of security when it comes to their backup measures, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- DDoS attacks enter new frontier with Portmapper
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Dark website Agora closes over Tor vulnerability suspicions
- Audit report finds sensitive data at risk for at least 73 Callif. agencies
- License plate reader helps spot Virginia killer, but privacy issues remain
- DD4BC are DDoS attack driving force, new report claims
- Researchers uncover possible Iranian-backed phishing scam