Data Security News, Articles and Updates
A recent study found that connected cars makers may require another three years before they can properly secure this type of vehicle.
The roll out of the EMV cards last fall was expected to bring a new level of data security to American consumers and retailers, but depending upon whom one speaks the cards have either been a boon or a bust.
Companies of all sizes are realizing the benefits of moving to private, public and hybrid clouds, but traditional security tools simply aren't working well in these environments.
Intrusion vs. breach: How security analytics & automated response can improve your chances of avoiding a breachAugust 12, 2015
In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization's risk of experiencing a material breach or cyber incident.
There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization.
id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?
The FTC Chairwoman cites 50 cases the commission has settled, including recent agreements with Fandango and Credit Karma.
After some experience with the European EMV "chip-and-PIN" card system while on vacation, the city of New York's CISO learned something about security: Don't take it for granted.
Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.
Perhaps Facebook users are beginning to expect more consideration from their friends on social networks.
When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
The Personal Data Protection and Breach Accountability Act of 2011 would require businesses with data of more than 10,000 customers to implement privacy and security programs.
With the April 18 tax deadline looming, security isn't top-of-mind for the employees in your finance, audit and operations departments.
Data breaches cost organizations $7.2 million on average in 2010, up seven percent from $6.8 million the previous year, according to a new study.
Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.
There was broad general support for establishing high standards of data security at a public forum convened by the Office of the Privacy Commissioner, but most respondents do not feel that the government should take the lead.
Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.
Should violations of corporate computer use policy be a federal crime, asks Charles Jeter, ESET cybercrime investigator.
The effects of last year's regulatory changes have already begun to surface, reports Angela Moscaritolo.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks