In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing e-mails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.
Leading this week's industry news roundup, Intel introduces a solution that provides end-to-end encryption of consumer and financial data built into POS systems, while Arbor Networks launches Peakflow, a DDoS mitigation solution.
Recent data breaches have drawn attention to the cybersecurity field, and millennials have taken notice. A new survey shows an increasing interest in the career path among young adults but also a lack of knowledge about the field.
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
As cyber-attacks evolve and multiply, traditional security solutions increasingly fall short. Ravikiran Bhandari of CSS Corp discusses new tools and strategies to enable pre-empting of advanced attacks.
Almost all versions of Windows are vulnerable to an OLE flaw that is being actively exploited in the wild. This is the second zero-day vulnerability tied to the so-called "Sandworm Team" of hackers, and no patch is yet available.
In his keynote address at the ISMG Fraud Summit New York on Oct. 21, PCI's Bob Russo predicts credit card fraud will significantly rise in the short term as EMV payment cards get rolled out in the United States. Find out why.
An FBI official on Oct. 20 said the hacks of JPMorgan Chase and other U.S. banks do not appear to have been in retribution for Western economic sanctions against Russia. But FBI investigators still have not determined who was behind the attacks.
Researchers demonstrate how ATMs could be hacked - without installing malware - by connecting a tiny computer to an inside port, bypassing the ATM's own computer and instructing the cash dispenser to begin issuing money.
Staples has confirmed that it's investigating a potential data breach after a report warned that elevated levels of payment card fraud had recently been tied to card numbers used by consumers who shopped at the office supply retailer.