A federal judge has dismissed a class action lawsuit filed against eBay in the wake of a 2014 data breach that exposed encrypted passwords and personal information for 145 million users.
Security expert Mike Canavan of Kaspersky Lab North America pinpoints several critical security steps that organizations can take to help reduce the likelihood they'll become a victim of a hacking attack.
Knowing exactly when to share information with law enforcement in the wake of a breach is challenging, says Assistant U.S. Attorney William Ridgway, a featured speaker at ISMG's Fraud Summit Chicago on May 19.
Our world has been radically transformed by digital technology - smart phones, tablets, and web-enabled devices have altered our daily lives, including the way we do commerce and manage our finances. At the same time, technology has enabled a new generation of criminals to gain access to information...
Partners HealthCare System is the latest healthcare organizations to suffer a data breach following a phishing attack. But why did Partners wait five months to issue a breach notification, when HIPAA requires notifications within 60 days?
The increasing use of cloud services and Big Data projects is causing major security concerns. This version of the Insider Threat Report focuses on the increasing use of all forms of cloud technology, and provides information about the security and data protection issues that need to be addressed. Increased risk,...
97% of Financial Services respondents report being somewhat or more vulnerable to insider threats. This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. financial services enterprises in the Fall of 2014. U.S. results are compared, where applicable, to findings...
Healthcare data (Personal Health Information [PHI] and other personal data held by healthcare organizations) has become one of the most desirable commodities for sale on "black" Internet sites, and for good reason. Healthcare records typically contain enough detail to not only apply for credit cards or loans, but can...
In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That's no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and...
In the past few years, Vormetric has been busy showing the world that it's no longer just your father's file and database encryption vendor. Since the launch of its Vormetric Data Security platform strategy in early 2014, the company has been hard at work extending the platform's capabilities with new features and...
In the wake of a breach, most organizations struggle with a number of concerns related to response, mitigation and notification. While immediate and full disclosure of a breach, in theory, sounds like the most practical advice, it's not always the best move for every organization. The nature of the breach, whether the...
Partners HealthCare System announced that it is the latest healthcare organization hit by a data breach attributed to a phishing attack. The records of an estimated 3,300 individuals may have been compromised in the incident.
Privacy advocates in the Senate have introduced a national data breach notification bill that would allow states to keep their own laws if they provide more stringent reporting and privacy protections than offered by the federal government.
Companies are increasingly reliant on storing sensitive data in cloud storage, which could be vulnerable to security threats and violate compliance requirements. At the same time, data breaches continue to grow more prevalent and costly. The Vormetric Cloud Encryption Gateway is a scalable solution that provides...
With big data analytics growing in popularity, many organizations have turned to MongoDB, which optimizes performance. Along with traditional sources of data, such as transactional systems and data warehouses, enterprises can now collect and leverage data from logs, social media interactions, sensors, and other...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.