The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
Two credit-card payment processors are offering to cover merchants' fines and penalties in the event of a data breach.
Compromised information networks can put an organization's very life in jeopardy. Here are ways that firms can take the lead.
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
A pharmacist wholesaler in Austria modernized its distribution systems and found protection for its network.
Miami Beach needed to quickly identify threats, generate immediate notifications and to quarantine infected computers.
A new study provides a review of the scope and impact of data security breaches in the health care industry.
Sidney Gellineau, CIO, NYC Transit, embraces the original vision of NAC - to vet unmanaged guest devices, reports Dan Kaplan.
One technologist wants the public to understand why releasing exploit code for a dangerous vulnerability is sometimes the right thing to do.
Many companies have a false sense of security when it comes to their backup measures, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- CTB-Locker ransomware variant being distributed in spam campaign
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Obama talks cybersecurity legislation in State of the Union
- Proposed CFAA revisions agitate IT security community
- PCI compliance not synonymous with security, panel says
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows
- Former California pharmacist employee accessed data without business or treatment purpose