The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
Two credit-card payment processors are offering to cover merchants' fines and penalties in the event of a data breach.
Compromised information networks can put an organization's very life in jeopardy. Here are ways that firms can take the lead.
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
A pharmacist wholesaler in Austria modernized its distribution systems and found protection for its network.
Miami Beach needed to quickly identify threats, generate immediate notifications and to quarantine infected computers.
A new study provides a review of the scope and impact of data security breaches in the health care industry.
Sidney Gellineau, CIO, NYC Transit, embraces the original vision of NAC - to vet unmanaged guest devices, reports Dan Kaplan.
One technologist wants the public to understand why releasing exploit code for a dangerous vulnerability is sometimes the right thing to do.
Many companies have a false sense of security when it comes to their backup measures, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure