Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
Improper disposal of protected health information poses significant risks, as recent breach incidents demonstrate. That's why organizations need to do a better job vetting disposal companies and verifying that data or devices are actually destroyed.
There is no doubt that cyber-attacks have grown in complexity and sophistication. As a result, a need has arisen for a new first line of defense. With the ever-broadening motivations for attacks coupled with easy to obtain and even easier to use attack tools, the traditional first line of defense, notably firewalls,...
How is one of the nation's top 20 bank holding companies fighting fraud? Find out directly from Matthew Speare, Senior Vice President of Information Technology for M&T Bank Corporation, as he spends an hour taking your questions about a variety of banking fraud topics, including:
Account takeover trends and the...
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
Kim Peretti, the ex-prosecutor who helped nab Heartland hacker Albert Gonzalez, says recent indictments offer insights into the actors behind global fraud schemes that affected 160 million cardholders.
Forty-seven percent of surveyed organizations have suffered a cyber attack in the past year. So, how equipped are global organizations to detect and defend against cyber attacks before they take root in endpoints and servers?
Register for the 2013 Cyber Security Study results webinar to learn more about: