The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
Two credit-card payment processors are offering to cover merchants' fines and penalties in the event of a data breach.
Compromised information networks can put an organization's very life in jeopardy. Here are ways that firms can take the lead.
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
A pharmacist wholesaler in Austria modernized its distribution systems and found protection for its network.
Miami Beach needed to quickly identify threats, generate immediate notifications and to quarantine infected computers.
A new study provides a review of the scope and impact of data security breaches in the health care industry.
Sidney Gellineau, CIO, NYC Transit, embraces the original vision of NAC - to vet unmanaged guest devices, reports Dan Kaplan.
One technologist wants the public to understand why releasing exploit code for a dangerous vulnerability is sometimes the right thing to do.
Many companies have a false sense of security when it comes to their backup measures, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- White House calls Sony hack a "serious national security matter," gov't mulls proper response