Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
Weeks, months or even years often go by before organizations discover they've been hacked, not learning of the attack until law-enforcement authorities inform them, says recently retired FBI Executive Assistant Director Shawn Henry.
After a quiet start to the year, the federal tally of individuals affected by major healthcare information breaches could soon exceed 20 million once three recent incidents are added. One of those incidents draws attention to the need for anti-hacking initiatives.
Eighty-five percent of data breaches go undetected, but organizations have a new type of cop on the beat to ferret out these illicit activities - the data scientist, says Phil Neray, head of security intelligence strategy and marketing for Q1 Labs, an IBM company.
Michael Locatis replaces Greg Schaffer as head of the Office of Cybersecurity and Communications in Homeland Security's National Protection and Programs Directorate.
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
Cloud computing for governments in the United States, especially services tailored for the federal government, may not be as efficient or as cheap as many would hope, says Richard Falkenrath, a principal with the security consultancy The Chertoff Group.
Until these deficiencies are fully addressed, a GAO audit reveals, increased risk exists to unauthorized access to sensitive data and programs and disruption of critical operations on managing the federal debt.
The nation needs to adopt information risk management to guide its approach to critical IT infrastructure protection, says Andy Purdy, a former DHS senior cybersecurity leader.
Government Accountability Office auditors have identified weaknesses in information security controls at the Securities and Exchange Commission that jeopardize the confidentiality and integrity of the SEC's financial information.
Securing the massive amounts of data swamping organizations, a trend known as big data, can be addressed, in part, by organizations simply getting rid of data no longer needed, Grant Thornton's Danny Miller says.
Is there an ideal message a senior executive can deliver amidst breach response? The recent breach of Global Payments Inc. and the subsequent CEO's response to the incident raise this question.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.