Roman is the former News Writer for Information Security Media Group. Having worked for multiple publications at The College of New Jersey, including the College's newspaper "The Signal" and alumni magazine, Roman has experience in journalism, copy editing and communications.
News that health insurer Anthem Inc. suffered a massive breach after hackers gained access to a corporate database illustrates yet again the healthcare sector's vulnerability. This infographic takes an updated look at the top five health data breaches.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
Last year, a number of application vulnerabilities led to compromises of many organizations' systems, serving as an important reminder that application security is vital to any breach prevention effort. Here, experts offer four app security tips.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
U.S. Central Command's Twitter and YouTube accounts were hacked Jan. 12, reportedly by ISIS sympathizers. The account compromises came the same day President Obama proposed new cybersecurity measures, including a national breach notification law.
In a Jan. 7 speech, FBI Director James Comey highlighted a bit of evidence to defend his agency's conclusion that North Korea was behind the cyber-attack on Sony Pictures Entertainment.
The biggest 2014 U.S. health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, according to a new infographic, which highlights patient risks and takeaways for healthcare organizations.
As organizations set their 2015 priorities for security defenses and breach prevention, they should keep in mind five important lessons learned from last year's top data breaches.
The FTC has approved a final order settling charges that Snapchat, which offers a photo messaging app, deceived consumers with promises about the disappearing nature of messages sent through the service.
New comments from the CEO of Sony Pictures about the film studio's response in the aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack risks.
If the top breaches of 2014 taught the security world anything, it's that size and sector don't matter - all organizations are vulnerable. This infographic takes a look at the top incidents and the lessons security leaders took away from them.
The Sony data breach is the top security news story of 2014, and ISMG has provided thorough coverage of the incident. Following is a comprehensive guide to Sony breach news, analysis and commentary.
A week after Sony Pictures canceled the release of the upcoming film "The Interview," the studio is now planning a limited run of the movie. Also, a congressman has sent a letter to Sony requesting details on the cyber-attack.
In determining the right time to issue a breach notification, organizations have to carefully weigh the risk of premature notification based on insufficient facts versus tardy notification that can have an impact on their reputation.
Sony Pictures in late November suffered a significant cyber-attack that led to intellectual property and personal employee details being leaked online. The following infographic provides an overview of the events leading up to, during and after the breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.