The Global Payments Inc. breach could be one of the four largest card-related incidents in recent years. Here's a look at three other major payment card breaches.
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
Information Security Media Group announces the launch of two new weekly newsletter tracks representing its DataBreachToday and InfoRiskToday media sites. Click for details on how to subscribe.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Verizon's 2012 Data Breach Investigations Report shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?
The rise in hacktivism and data breaches changed the information security landscape. These incidents also influenced the content of RSA Conference 2012, says Hugh Thompson, event program committee chair.
In the weeks following last year's TRICARE health information breach, some of the 4.9 million beneficiaries affected became victims of financial fraud, an amended class action lawsuit states.
One important reason why encryption is not more broadly used in healthcare is that many organizations lack an updated risk assessment, says attorney Amy Leopard.
Cyber spies in China are suspected of launching an attack against a NATO senior military commander, U.S. Admiral James Stavridis, using a Facebook scam to gather information about Stavridis from his friends and colleagues, according to U.K. newspaper reports.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
Authorities link the suspects to attacks on U.S. and foreign government websites, financial services companies, government contractors and media companies.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
A free report offers a detailed method for calculating the potential cost of healthcare breaches and a method for justifying an investment in data security.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.