Verizon has made a strong case for continual PCI DSS awareness with its new study of payment card data security. But like many vendors that conduct their own studies supporting their business cases, Verizon makes suspect logical stretches.
The telecom sector in India has repeatedly been targeted by malware attacks, raising serious concerns about vulnerabilities in one of the largest local business sectors. As a result, some security experts are calling for stronger enforcement of regulations and more frequent security audits.
It's not enough to comply with government and industry regulations such as SOX, PCI, MICS, and HIPAA. Organizations must also prove their compliance to auditors on a regular basis. Even companies not bound by regulatory requirements may need to confirm their adherence to internal IT security policies.
But...
In a rare acknowledgment of a data breach by an Indian company, online restaurant guide and food ordering service Zomata says 17 million users' email addresses and hashed passwords were stolen from its database. The company was hacked by a white-hat hacker back in 2015.
The complexity of information technology and the constantly evolving threat landscape makes implementing appropriate controls and processes to secure information assets a major challenge for most enterprises in and out of government. The number of vulnerabilities organizations face is mindboggling: the National...
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Despite significant investments in the signature-based defenses of today's network, email and endpoint security solutions, since 2010, these solutions have been ineffective against the sheer volume of evolving malware. Security and risk professionals have turned to automated malware analysis (AMA) for help. These...
As defense stategies become stronger year after year, it seems as though the prevalence of malware is growing proportionately, projected to exceed $2 trillion by 2019 - a four-fold increase in the cost of security breaches over 2015.Posing a threat to every industry, profession, and company, malware not only...
As the New Year unfolds, finding a breach prevention provider will be critical in order to safeguard an organization's assets. NSS Labs subjected nine cybersecurity market leaders to comprehensive, rigorous testing to determine how well each product handled current advanced threats and attack methods. All vendor...
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
In an interview about cybersecurity metrics, Olcott...
A new audit that uncovered numerous problems with the U.S. Secret Service's IT management is "alarming," says House Oversight Chairman Jason Chaffetz, a victim of a Secret Service insider breach.
"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
Same-day Automated Clearing House (ACH) payment processing became a reality. While this represents a terrific opportunity for banks to be responsive to their customer's requirements for faster ACH payments, plus the ability to attract new customers from banks who choose not to offer the same level of responsiveness,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.