Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute, discusses:
Insider threat...
Interview with Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of...
Nearly 70% of the weaknesses and deficiencies in the IRS's IT systems remain unresolved one year after being identified, jeopardizing the confidentiality, integrity and availability of sensitive taxpayer information.
A grand jury indicts a former Transportation Security Administration data analyst who was told he was about to lose his job with trying to damage a computer used to screen terrorists.
Ghosts of Crimes Past and Present Will Haunt the Future of Banking Institutions and Customers
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were hit from every angle with...
"We're trying to hire anyone with pulse and got some knowledge of technology component needed to build this," the head of the Cloud Security Alliance quotes cloud computing services providers.
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
The unauthorized publishing on a government website last May of a document revealing information on civilian nuclear sites was the shared fault of all of the agencies involved in creating it, the Government Accountability Office reports.
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
While external threats to corporate data have made headlines, an even greater threat is posed by company employees. Sometimes, employees accidently expose sensitive data to the public by losing valuable data stored on a USB drive or laptop that is lost or stolen. At other times, disgruntled laid-off employees may...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.