id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?
The FTC Chairwoman cites 50 cases the commission has settled, including recent agreements with Fandango and Credit Karma.
After some experience with the European EMV "chip-and-PIN" card system while on vacation, the city of New York's CISO learned something about security: Don't take it for granted.
Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.
Perhaps Facebook users are beginning to expect more consideration from their friends on social networks.
When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
The Personal Data Protection and Breach Accountability Act of 2011 would require businesses with data of more than 10,000 customers to implement privacy and security programs.
With the April 18 tax deadline looming, security isn't top-of-mind for the employees in your finance, audit and operations departments.
Data breaches cost organizations $7.2 million on average in 2010, up seven percent from $6.8 million the previous year, according to a new study.
Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.
There was broad general support for establishing high standards of data security at a public forum convened by the Office of the Privacy Commissioner, but most respondents do not feel that the government should take the lead.
Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.
Should violations of corporate computer use policy be a federal crime, asks Charles Jeter, ESET cybercrime investigator.
The effects of last year's regulatory changes have already begun to surface, reports Angela Moscaritolo.
Sign up to our newsletters
SC Magazine Articles
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows
- Former California pharmacist employee accessed data without business or treatment purpose