Sharing lessons learned with managers and staff is key to halting breaches, says Lena Smart, CIO, New York Power Authority. Steve Zurier reports.
It is an assumption for many enterprises operating today that they may already have been compromised.
Selling for as little as $1, Uber login credentials have been found on the black market though the company still denies it was hacked.
An unauthorized third party generated suspicious activity on some Executive Club and Registered Customer accounts.
Access to the internet within North Korea has been undependable in the past 24 hours.
Staff member credentials were used to access ICANN systems after spearphishing campaign that began in November.
Application control is more than whitelisting-It's monitoring, visibility, protection & default denyDecember 04, 2014
Application Control technology is more than just whitelisting. Organizations have found significant value via full visibility into server and desktop environments by continuously monitoring and observing application behavior.
The latest iteration of the PCI Security Standard calls for moving beyond simply meeting compliance mandates, reports Jim Romeo.
Tracking down threat actors is no easy feat, and requires an immense amount of research and collaboration.
Alberta Health Services is apologizing following a data breach at Alberta Children's Hospital.
A Canadian is leading a $500 million class-action lawsuit against Home Depot following its data breach in which up to 56 million US and Canadian credit cards were stolen.
A cyber liability policy covers first-party liability (property and theft) and third-party liability (privacy and data security).
It will continue to be a year where companies need to focus on how their employees interact online.
In a letter to shareholders, Roxanne Austin defended the board's security efforts before and after the December data breach.
The Institutional Shareholders Services said the retailer fell short in preparing for and responding to last December's massive data breach.
An appellate court ruled that patients' personal information was not coupled with medical history, treatment or other medical data.
Without insight into third-party liabilities and expenses, Target's interim CEO told CNBC that the retailer still doesn't know the cost of last December's data breach.
The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.
After three data breaches exposed personal data of 619,000 of the chain's customers, a shareholder claims board members and officers are liable.
An early February breach took down two government websites and prompted the state to shell out $72,450 for vulnerability testing.
Between January and March, healthcare was targeted most often but the financial sector lost the most records.
The retailer named Bob DeRodes to lead the transformation of its IT infrastructure, including a switch to MasterCard chip and PIN technology in 2015.
A motion filed in Maricopa County Court says that by delaying notification and lying about last April's breach, MCCCD put victims' PII at risk.
Surveillance video released in Lakewood, Colo., shows a suspect known as Steve Locke carrying purchases made with stolen cards.
Plaintiffs claim that stolen personal information was sold and used for fraud and identity theft.
Targeted attacks grew by 91 percent and lasted three times longer, according to a recent threat report.
The number of data breaches reported by U.S. government agencies more than doubled in a four-year period, jeopardizing PII, a GAO official tells Senate committee.
A study by IDC and the National University of Singapore also found a close link between pirated software and cyber security breaches.
Two former nurses' aides for Virginia-based nonprofit Sentara Healthcare have pleaded guilty to accessing thousands of electronic patient records and using the information to file fraudulent tax returns.
A spreadsheet posted online contained sensitive information on nearly 1,000 clients of Pierce County Housing Authority in Washington.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure