The 'Cybersecurity Domino Effect' is a new term to describe the cumulative impact of multiple data breaches. How should organizations and individuals respond? Michael Bruemmer of Experian offers guidance.
In this audio report on a Senate hearing, the federal CIO justifies his backing of Office of Personnel Management Director Katherine Archuleta as she defends retaining a contractor whose stolen credentials may have led to the breach.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.
Listen to an audio report on a House hearing where key federal lawmakers explain why Katherine Archuleta should be fired as Office of Personnel Management director in the wake of what could be the largest government breach ever.
Although hacker attacks have dominated the recent headlines, a snapshot of the federal health data breach tally shows that stolen unencrypted devices continue to be a common breach cause, although these incidents usually affect far fewer patients.
Office of Personnel Management Director Katherine Archuleta tells Congress that neither she nor anyone else at OPM should be held personally responsible for a breach of agency computers in which the personal information of millions was stolen.
The hack of the U.S. Office of Personnel Management may have exposed personal information for "tens of millions" of people, a new report says, with a single database containing information for 18 million people.
The 'Cybersecurity Domino Effect' is a new term to describe the cumulative impact of multiple data breaches. How should organizations and individuals respond? Michael Bruemmer of Experian offers guidance.
Polish airline LOT claims that a hack attack disrupted its ground-control computers, leaving the airline unable to issue flight plans and forcing it to cancel or delay flights, grounding 1,400 passengers.
The FCC's new rule aimed at giving consumers the opportunity to opt out of voice and text alerts does offer exceptions for fraud alerts. But experts say the FCC's exemptions need more clarification.
When it comes to malware, how wide is the gap between infection and detection - and what is the potential business impact on organizations? Paul Martini, CEO of iboss Cybersecurity offers insights and strategies.
The National Institute of Standards and Technology has issued new guidance, Special Publication 800-171, aimed at protecting federal data that's stored and processed on information systems outside the federal government.
At CA Technologies, mobile security is not just a solution for customers; it's a practice that IT security leaders have embraced internally. CA's Robert Primm discusses how to secure a borderless workplace.
While advancements in cyber security technology have brought us a long way from where we were just a year ago, many organizations are still vulnerable to attack. Read this blog to learn more about protecting yourself and your digital assets.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.