Health insurer Anthem Inc. has suffered a massive data breach after hackers gained access to a corporate database reportedly containing personal information on as many as 80 million of its current and former U.S. customers and employees.
Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
A new report claims that Russian hackers, using spear-phishing attacks, breached the Sony Pictures Entertainment network by November 2014. But it's not clear whether they were responsible for the "G.O.P." attacks attributed by the FBI to North Korea.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Prime Minister David Cameron has cited televised crime dramas to justify his push to expand Britain's surveillance laws and collect bulk Internet and mobile usage data. But does cop show fiction square with surveillance fact?
In addition to dealing with sophisticated threats to SCADA and IC Systems, utilities have to address specific regulatory requirements like NERC Critical Infrastructure Protection (CIP) Cybersecurity Standards.
Download this whitepaper to:
read a summary of the NERC CIP requirements;
identify the key security...
When shopping in-store, customers want and expect connectivity - plus they are inclined to buy more when they have a personalized shopping experience. However the cyber security responsibility falls directly on the retailer to protect their customers and the company's reputation from the next data breach.
Download...
As a 20+ year leader in check fraud detection and prevention, Fiserv has the unique opportunity to observe market trends related to RDC and check fraud. During this webinar you will hear from Mike Urban with Fiserv Financial Crime Risk Management, who will discuss these trends and the specific capabilities banks need...
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
For the third time in recent weeks, in-the-wild attacks are exploiting a newly discovered zero-day vulnerability in
Adobe's Flash plug-in for Web browsers, Trend Micro reports.
Hackers posing as women on Skype tricked Syrian opposition fighters into infecting their systems with malware, which furnished the hackers with "valuable insight into military operations," according to a new report from cybersecurity firm FireEye.
The end of a year brings reflection as well as a chance to pause and look to the future. To help businesses understand implications of such changes and navigate the road ahead, Experian® Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions...
Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat...
Online and mobile commerce is increasing exponentially - unfortunately so is fraud based on stolen or fake identities. Combating identity-based fraud is challenging, but the key to success is a multi-phase approach - one that encompasses identity verification and big data for fraud mitigation.
Join this session...
Starting in April, Singapore plans to have a dedicated and centralized cybersecurity agency. But experts question whether the agency can take a holistic approach and effectively coordinate with industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.