The Latest News

  • 3 States to Probe Premera Breach

    Looking for Answers About Cause, Response 3 States to Probe Premera Breach
    Washington Insurance Commissioner Michael Kreidler

    Three state insurance commissioners are launching a joint investigation into the cyber-attack against Premera Blue Cross, which exposed personal data of 11 million individuals nationwide. Find out what will be examined. Read more...

  • Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats. Read more...

  • Free Defense for Alleged $18M Hacker?

    Prosecutors Say Russian Has Resources to Pay Attorneys Free Defense for Alleged $18M Hacker?
    Accused hacker Roman Seleznev. Source: Department of Justice

    U.S. prosecutors are asking a judge to rescind his decision to provide a free defense for a Russian citizen who faces 40 charges relating to the alleged theft and sale of at least 2 million credit card numbers. Read more...

  • Judge OK's Target Breach Settlement

    Affected Consumers Will Get a Total of $10 Million Judge OK's Target Breach Settlement

    A federal judge has granted preliminary approval of a $10 million settlement of a consolidated class action lawsuit filed on behalf of consumers affected by the massive 2013 Target data breach. Read more...

  • Why Are Health Insurers Hacker Targets?

    'Treasure Trove' of Personal Information Has High Appeal Why Are Health Insurers Hacker Targets?

    The massive cyber-attacks targeting health insurers Premera Blue Cross and Anthem Inc. make it clear that hackers increasingly view large healthcare organizations, especially payers, as attractive targets. Read more...

  • Article

    Breach Notification Bill Advances

    Amendments to Keep Some State Safeguards Rejected By Eric Chabrow
    Breach Notification Bill Advances

    Efforts by some Democratic members of a House subcommittee to amend a national data breach notification bill so that states could retain tougher data security requirements have failed. The measure now advances to a full committee.

  • Article

    Another Info-Sharing Bill Introduced

    Latest Measure Addresses Liability, Privacy Concerns By Eric Chabrow
    Another Info-Sharing Bill Introduced

    Add the Protecting Cyber Networks Act to the growing list of cyberthreat information sharing legislation pending before Congress. Lawmakers are now considering four measures, all designed to help thwart data breaches.

  • Blog

    Google's Psychological Patch Warfare

    'Project Zero' Rewrites Vulnerability Disclosure Norms By Mathew Schwartz
    Google's Psychological Patch Warfare

    Psychologically speaking, nothing beats the power of a well-timed deadline. And love it or hate it, Google's 90-day "Project Zero" deadline for fixing flaws - before they get publicly disclosed - has rewritten bug-patching rules.

  • Article

    Romanian Charged in Multiple U.S. Hacks

    Medical Offices, Retailers, Security Firms Among Alleged Targets By Marianne Kolbasuk McGee
    Romanian Charged in Multiple U.S. Hacks

    A former systems administrator at a Romanian financial services institution has been extradited to the U.S. and charged with orchestrating an international hacking scheme that included attacks on medical offices, retailers and security firms.

  • Article

    GAO Faults IRS Security Processes

    Alleges Agency Fails to Appropriately Secure Key Applications By Eric Chabrow
    GAO Faults IRS Security Processes

    A Government Accountability Office audit shows that Internal Revenue Service financial and taxpayer data remain unnecessarily vulnerable to inappropriate and undetected use, modification and disclosure.

More news...

Webinars

More webinars...

White Papers

  • Win the Race Against Time to Stay Ahead of Cybercriminals

    Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be...

  • Data Capture and Network Forensics

    The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all...

More whitepapers...
ARTICLE Unsecured Folder Leads to Big Breach

An unsecure folder of patient data that was accessible via the Internet has resulted in a breach...

Latest Tweets and Mentions

ARTICLE Unsecured Folder Leads to Big Breach

An unsecure folder of patient data that was accessible via the Internet has resulted in a breach...

The ISMG Network