Let's give BlueCross and BlueShield of Tennessee some credit for acknowledging that it has spent more than $7 million so far dealing with the aftermath of the theft of 57 unencrypted hard drives from a call center.
That breathtaking sum makes it crystal clear that potential data breaches have huge business...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
How prepared is the financial services industry in the event of a cyber attack?
The Financial Services Information Sharing and Analysis Center (FS-ISAC), a national industry forum, will conduct Cyber Attack Against Payment Processes (CAPP), an exercise to measure the ability of financial institutions, payment...
Among skills sought: cyber incident response, vulnerability detection and assessment, networks and systems engineers, cyber risk and strategic analysis and intelligence and investigation.
The breach is the latest of many cyber assaults that have plagued the space agency, which experienced 1,200 security incidents in 2007 and 2008, resulting in the installation of malicious code and unauthorized access to sensitive information.
Public and private sector organizations alike are charged with protecting critical data and responding to incidents that put information security at risk. In this session, David Matthews, deputy CISO for the City of Seattle, reveals:
Data protection challenges;
Tools to meet those challenges;
How to respond to...
Complying with the provisions of FISMA, which include NIST standards and guidelines, will by definition make government IT systems more secure, says NIST senior computer scientist Ron Ross.
Organizations understand the need for Business Continuity and Disaster Recovery in the face of natural, man-made and pandemic disasters. But what about Business Resiliency, which brings together multiple disciplines to ensure minimal disruption in the wake of a disaster?
Register for this webinar to learn:
How...
This past Independence Day weekend, hackers targeted government and business websites in the United States and South Korea, causing confusion for network managers to differentiate between legitimate and illegitimate web traffic.
Security related incidents such as these have become not only more numerous and...
The Heartland data breach and July's denial of service (DDoS) attacks against government agencies are among the biggest information security incidents of the year. And they've pushed incident response into the spotlight.
Peter Allor is on the Steering Committee of the Forum for Incident Response and Security Teams...
Contractor is said to blame weak password protection, but one congressman - Rep. Spencer Bachus, R. Ala - suggests attacks may have been more sophisticated.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.