A new report for shareholders recommends that seven members of Target Corp.'s board of directors should be replaced as a result of the retailer's massive data breach. Experts discuss the role boards must play in cybersecurity.
Web application attacks increased more than malware-fueled point-of-sale intrusions last year, Verizon's latest breach report shows. Analyst Dave Ostertag reviews the complete results and offers breach prevention insights.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
In the more than a month since the Heartbleed bug was announced, many organizations have made progress in mitigating the risks. Security experts highlight gaps that remain and offer remediation advice.
Several state attorneys general are investigating the data breach at eBay, which potentially exposed the encrypted passwords of 145 million customers. Plus, the New York AG is asking the company to provide free credit monitoring to those affected.
Supporters of a stronger version of the USA Freedom Act pin their hopes on the Senate after the House overwhelmingly approved a watered-down version of the measure aimed at curtailing the government's collection of American's phone records.
The arrests of more than 90 individuals for their alleged involvement in the use of BlackShades malware is a sign of progress in the global fight against cybercrime, but some experts question whether the crackdown will serve as a fraud deterrent.
There are a number of reasons why the U.S. government indicted five Chinese army officers for hacking American corporate computers to steal intellectual property. Bringing the assailants to justice isn't one of them.
Five Chinese military officers have been indicted for hacking U.S. companies - incidents that had major consequences, including the shuttering of three American steel plants, according to U.S. Justice Department officials.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.