Cyber spies in China are suspected of launching an attack against a NATO senior military commander, U.S. Admiral James Stavridis, using a Facebook scam to gather information about Stavridis from his friends and colleagues, according to U.K. newspaper reports.
Organizations are not taking the advanced persistent threat seriously enough, says Hord Tipton of (ISC)2. But security professionals also are not mitigating the common threats, he says. Watch the video.
Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.
Authorities link the suspects to attacks on U.S. and foreign government websites, financial services companies, government contractors and media companies.
A free report offers a detailed method for calculating the potential cost of healthcare breaches and a method for justifying an investment in data security.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.
FBI Director Robert Mueller says the bureau will apply the methods it uses to combat terrorism along with old-fashioned gumshoe practices such as infiltration of criminal networks to battle cybercriminals.
Attorney Adam Greene and security specialist Mac McMillan review lessons learned from major healthcare information breaches and provide insights on breach prevention.
A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.
No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
Data breaches tied to credit and debit cards accounted for more than 25% of all breaches in 2011. What must banking institutions and merchants do to help reverse this trend?
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.