Exactly how big was the Heartland data breach?
This is the great unanswered question since last week, when Heartland Payment Systems (HPY), a Princeton, NJ-based credit card processor, revealed that its computer systems had been breached, and an unknown number of credit card account numbers were exposed to...
There are at least six institutions so far that have found out their customers' credit or debit cards could have been compromised as part of the Heartland Payment Systems breach.
Heartland (HPY), the sixth-largest payments processor in the U.S., announced earlier this week that its processing systems were breached...
Heartland Payment Systems, the sixth-largest payments processor in the U.S., announced Monday that its processing systems were breached in 2008, exposing an undetermined number of consumers to potential fraud.
Meanwhile, Forcht Bank, one of the 10 largest banks in Kentucky, told its customers it would begin...
Higher education hasn't been immune to the ravages of the recession economy. Scholarships and tuition reimbursements are tougher for students to come by, and career opportunities have diminished.
That said, job opportunities for information security students abound - in both the private and public sectors.
In an...
Information security experts are bracing for the law of unintended consequences to swing into action in 2009 as layoffs, downsizing and low morale bring the worst out of trusted insiders looking to profit off of proprietary intellectual property, customer contact lists, trade secrets and any other sensitive...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
Check fraud. Crimes against children and the elderly. These are among the current faces of Identity Theft, and experts expect to see even more of these opportunistic crimes in 2009.
To help prevent these crimes - and to help banking institutions to protect their customers - Linda Foley, founder of the Identity...
Interview with Jody Westby, Adjunct Distinguished Fellow at CyLab and CEO at Global Cyber Risk
At a time when risks are high and consumer confidence is low, corporate boards of directors aren't paying nearly enough attention to information security and cyber threats.
This is the key takeaway from a new Carnegie...
The recession is officially here, and major banking institutions are announcing thousands of layoffs weekly. And, yet, now is a good time for information security professionals, whose skills and expertise are in greater demand than ever.
In this exclusive interview, W. Hord Tipton, Executive Director of (ISC)²,...
Signing up for a hosted IP PBX provider is just like signing up for cable TV; the provider is trying to lock you in to a long-term contract at terms that give them the most profit, while you're just trying to get the service and features you need at the lowest possible price. Plus, there are always hidden...
IT Security requires effective control over physical IT assets. Radio Frequency Identification (RFID) methodologies bridge gaps left by conventional process, electronic/software, and barcode tracking solutions. Using compact, rugged, specially designed tags and flexible integration frameworks, leading RFID solutions...
In recent years, the hacking community has shifted its efforts toward a new frontier: the application layer. With most companies spending thousands, if not millions, of dollars securing the perimeter with network firewalls, intrusion prevent systems, and other devices, hackers have realized the lowest hanging fruit...
This whitepaper presents an overview of the security options that can help thwart fraud today and into the future, including multi-factor authentication and fraud detection solutions. With a clear understanding of the tools available and a way to effectively begin and evolve, organizations can take the essential steps...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.