From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
Target Corp. is providing $5 million to help fund an effort to educate consumers about the risks of cybercrime. Meanwhile, a group of House Democrats had called for a hearing about the retailer's breach, while two senators have demanded details.
Training that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject.
Call center fraud is one of the leading threats that financial institutions will battle next year because fraudsters consider the centers to be an easy target. But what can be done to mitigate this threat?
U.S. Attorney Steve Wiggington says identity theft, especially linked to card skimming, is still the No. 1 fraud threat facing financial services institutions as well as consumers. He stresses information sharing is critical for fighting fraud.
The breach of a card loyalty marketing company that exposed card data and other personally identifiable information illustrates the privacy vulnerabilities third parties pose, experts say.
In mitigating insider threats, technology should be used in conjunction with information sharing and risk-prevention business practices, says Jason Clark, a researcher at Carnegie Mellon University.
Senior leaders in business and government are buying in to the need for more cybersecurity investments as well as threat-intelligence sharing, new research shows. But why are they still struggling to hire the right security pros?
Despite the recent lull in al-Qassam Cyber Fighters' DDoS attacks against U.S. banks, the ABA's Doug Johnson and FS-ISAC's Bill Nelson warn banks to avoid complacency, noting that DDoS attacks pose an ongoing threat.
Mitigating card risks associated with retail malware attacks and POS vulnerabilities is a focus of updates to the PCI Data Security Standard, say Bob Russo and Troy Leach of the PCI Security Standards Council.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
When Richard Nealon first sat for his CISSP exam, he was struck by how U.S.-centric the questions were. Since then, he has strived to promote greater awareness of global information security concerns.
Facing advanced cyber-attacks, organizations must shift their focus to detection and mitigation, says ISACA's Jeff Spivey, who outlines four capabilities necessary for effective response.
The skills/staffing shortage was top of mind among thought-leaders at the recent Infosecurity Europe event. But what will it take to attract the new faces and skills we need to grow the profession?
When Richard Nealon first sat for his CISSP exam, he was struck by how U.S.-centric the questions were. Since then, he has strived to promote greater awareness of global information security concerns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.