New cybersecurity legislation under consideration in Singapore would make it mandatory for owners of critical information infrastructure to report security breaches within hours and require cybersecurity vendors providing highly sensitive services to be licensed.
London-based health insurer Bupa Global is warning international policyholders that a breach affecting 547,000 customers - with data showing up on darknet marketplace AlphaBay for sale - traces to a now-former employee.
Australia plans to introduce new laws by the end of the year that would compel technology companies to provide access to encrypted communications under legal orders. Tech companies are bristling.
Organizations need to take a well-considered, structured approach to integrating IoT into existing information risk management processes to address security, Gartner's Ganesh Ramamoorthy explains in an in-depth interview.
Leading the latest edition of the ISMG Security Report: a report on FBI Director-Designate Christopher Wray's admission that he faces a steep cybersecurity learning curve. Also, the U.S. government restricts use of Moscow-based Kaspersky Lab Software. Is that a smart move?
As the global threat landscape shifts, so does Kaspersky Lab. Moving from its traditional cybersecurity focus, Kaspersky now is honing in on fraud prevention. Emma Mohan-Satta describes this shift and what it means for security and anti-fraud leaders.
As software as a service (SaaS) and cloud applications have grown in popularity, IT environments have become more distributed, fragmented and nebulous - with many components existing outside of the traditional security perimeter of firewalls and virtual private networks (VPNs).
Download this whitepaper to learn...
Privileged users with nearly unlimited access pose a special threat to security, particularly as the world of enterprise IT continues to evolve from traditional data centers toward software-defined data centers and both private and public clouds. While standards and regulations bodies, along with auditors, have...
Earlier this year, IBM announced the availability of Watson for Cyber Security, described as "the industry's first augmented intelligence technology designed to power cognitive security operations centers." But how will Watson complement human security teams? And what do beta customers say about their initial...
The Trump administration has moved to restrict the U.S. government's ability to use products built by Moscow-based anti-virus firm Kaspersky Lab, which claims it's been caught up in a "political game" being played out between Washington and Moscow.
Two years after a massive breach that exposed the personal information of some 21.5 million individuals, the U.S. Office of Personnel Management continues to labor in its attempt to guarantee the security of its information systems.
The recent WannaCry ransomware campaign has led to more healthcare organizations paying closer attention to cybersecurity and the latest threats, says Lee Kim of the Healthcare Information and Management Systems Society.
The workforce of information security analysts in the United States has exceeded 100,000 for the first time, more than doubling since the Department of Labor's Bureau of Labor Statistics began publishing full-year statistics for the occupation category in 2012.
Managed security services initially came into the market under the garb of consulting and started taking off because it helped organizations bring in some measurability, says Avinash Prasad, vice president and head of the managed security services business at Tata Communications."The on-premises model was the norm and...
Managed security services initially came into the market under the garb of consulting and started taking off because it helped organizations bring in some measurability, says Avinash Prasad, vice president and head of the managed security services business at Tata Communications."The on-premises model was the norm and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.