In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.
With Alabama and South Dakota recently becoming the last two states to adopt breach notification laws, notification processes become more complicated, says privacy attorney Adam Greene, who offers an in-depth analysis.
A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider 7.ai that led to the infiltration of online chat portals for Delta, Sears, Best Buy, Kmart and perhaps others.
Alexis Castellani spent a decade with the FBI, focused primarily on counter-terrorism. Now she is bringing some of these same skills to bear in her role as a cyber fraud prevention executive at Citi. What insights can she share on fraudsters and their schemes?
After a career in law enforcement at the local, state and federal levels, Shape Security's Dan Woods has learned a lot about fraud and fraudsters. He offers insight on how to get to know attackers and put that knowledge to work.
FireEye has noticed an emerging trend: Breach investigations are increasingly prompting audits intended to ensure publicly traded companies are compliant with Sarbanes-Oxley. IT has changed dramatically since SOX became effective 16 years ago. Here's what to keep in mind.
Four Singapore universities were allegedly attacked by an Iranian hacking group accused of stealing more than 31 terabytes of data from universities all over the world, local officials confirmed. Some 52 accounts were targeted.
Security leaders in India are sizing up a Ministry of Health and Family Welfare proposal to roll out a digital information security law for the healthcare sector that includes a breach notification requirement.
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.
Traditional approaches to authentication can't work effectively in a digital environment where customers and partners are interacting from multiple vectors. Evan O'Regan of Entrust Datacard discusses how to remove friction - and fraud - from the process.
Panera Bread appears to have failed to fix a customer data leak for more than eight months after getting a heads-up from an independent security researcher. Here's what others should learn from the bakery café chain's mistakes.
Panera Bread is warning that information on 10,000 customers has been inadvertently exposed. The data leak, however, persisted despite the company being alerted to the problem eight months ago, and there are signs that the victim tally may be much higher.