A number of storage devices belonging to the California Department of Child Support Services went missing while in transit.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
A need for risk managers with specific skills in business continuity planning and disaster recovery.June 01, 2011
A need for risk managers with specific skills in business continuity planning and disaster recovery.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
As more organizations continue migrating to the cloud, what should information leaders at organizations be asking of their provider?
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
American and Russian officials recently met to discuss cybersecurity issues, such as collaboration among law enforcement bodies and the use of cyberweapons, the New York Times reported in its Saturday editions.
Just weeks after reports surfaced that foreign spies have penetrated the U.S. power grid lawmakers are now set to introduce a bill Thursday aimed at creating standards to protect the nation's critical electric infrastructure.
McAfee has launched a free Cybercriminal Response Unit (CRU), meant to be an "online 911" where cybercrime is diagnosed and treated.
The Pentagon has spent more than $100 million in the past six months repairing damage to its networks caused by cyberattacks, according to military officials.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The news comes after a serious weakness was revealed last week in the MD5 cryptographic hash function.
Certification Authorities that have not moved to a more secure cryptographic hash function than MD5 have come under fire in the security world.
Research presented at the 25th Chaos Communication Congress in Berlin demonstrated how an attacker could impersonate any website, including those secured by the HTTPS protocol.
A simulation this week demonstrated the need for better collaboration among public and private security groups.
The scale of distributed denial of service attacks has grown 100-fold since 2001, leaving some ISPs with long outages.
Sign up to our newsletters
SC Magazine Articles
- FireEye: First multi-vendor ATM malware targeting cardholders
- Customer data possibly compromised in online photo store malware attack
- Excellus BlueCross BlueShield announces breach, 10.5M records at risk
- CVS employee steals data on 55K Molina Healthcare members
- False Facebook 'dislike button' ensnares users