While the overall numbers seem relatively small when the entire universe of cyber incidents is considered, they suggest the IT systems that control the critical infrastructure America's economy and society rely on to function are increasingly at risk.
DHS will deploy sensors to agencies, generating the needed 60 billion to 80 billion vulnerability-and-configuration-setting checks every one-to-three days across the .gov network.
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
The Alaska Department of Health and Social Services has agreed to pay $1.7 million to settle a HIPAA case stemming from a relatively small breach. Federal authorities listed numerous security shortcomings at the department, which oversees Medicaid in the state.
Two members of the hacktivist group LulzSec have pleaded guilty in the UK to conspiring to attack high-profile targets, including the U.S. Senate and Sony, last year.
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
Authorities say the suspect from suburban Philadelphia obtained users' credentials to the compromised computers and sold access to the breached computer networks, as well as other access credentials.
Memorial Sloan-Kettering Cancer Center in New York is notifying 880 patients that some of their personal information may have been exposed when it was inadvertently embedded in PowerPoint charts posted on two websites.
Brokers and insurers have upped their marketing efforts to get enterprises to purchase cyber insurance, even though policies could be risky for sellers and buyers. See 10 considerations you should mull before buying cyber insurance.
Federal authorities have charged a Dutch hacker for the role he played in an elaborate scheme that targeted POS systems and networks to steal credit card details that were later sold on websites for fraudulent purposes.
How can organizations mitigate increasing cybersecurity risks posed by hacktivist groups and organized crime? Verizon's Chris Porter offers recommendations.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
LinkedIn, the social network that's investigating the pilfering of nearly 6.5 million of its members' passwords, has neither a chief information officer nor chief information security officer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.