From a risk-management perspective, Bloomberg didn't consider its reputation when it allowed its reporters to track the log activity of Bloomberg Terminal customers.
Why are ATM cash-out schemes expected to increase - especially in the U.S.? John Buzzard of FICO's Card Alert Service offers insights, based on federal investigators' most recent global fraud bust.
Former OMB leaders Karen Evans and Franklin Reeder are trying to determine how to improve evaluation of information security within U.S. federal government agencies in an effort to correct current flaws.
Payment data and personal information are both attractive targets for criminals, says breach investigator Erin Nealy Cox of forensics firm Stroz Friedberg. Learn why she says card data isn't the only lucrative target.
Unless they earn patients' and providers' trust, healthcare information exchanges are destined to fail. That's why it's essential to tackle key privacy and security issues right away.
Ask chief information officers about the effectiveness of education and training to reduce cyber-vulnerabilities, and you'll get a big shrug of the shoulders - at least from half of them.
The OWASP Top Ten list of security risks was created more than a decade ago to be the start of an industry standard that could bootstrap the legal system into encouraging more secure software. Here are the 2013 updates.
A recent $1 million cyberheist at a county hospital illustrates why healthcare organizations must pay attention to securing financial as well as clinical data - and educate staff about how to recognize phishing e-mails.
A citizen's petition that received more than 117,000 signatures asks the White House to stop the Cyber Intelligence Sharing and Protection Act. Why does the White House response suggest a redo of last year's battle over cybersecurity legislation?
The skills/staffing shortage was top of mind among thought-leaders at the recent Infosecurity Europe event. But what will it take to attract the new faces and skills we need to grow the profession?
A Senate panel approved a bill to strengthen e-mail privacy protections despite concerns expressed by the head of the Securities and Exchange Commission that the legislation could hinder investigations.
Imagine this: A lewd picture of Anthony Weiner is sent from his Twitter account, and he claims his account was compromised, and that a hacker sent the image. Would you believe him?
Distributed-denial-of-service attacks against banks are popping up in parts of Europe. So what can we expect next in this ongoing wave of cyber-attacks? And will the major London banks be targeted?
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
The UK government pledges at Infosecurity Europe to help businesses improve cybersecurity. But it's going to take more than vouchers and training to address Europe's top threats to security and privacy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.