Given the potentially disastrous consequences of a breach, it is important for IT and security leaders to be aware that there are simple and extremely cost efficient steps that any organization can take immediately to improve protection and reduce risks.
How can your organization reduce risk by taking a proactive...
Data security presents a multidimensional challenge in today's complex IT environment. Multiple access paths and permission levels have resulted in a broad array of security threats and vulnerabilities. Traditional "fortress approaches" such as firewalls and IDS/IPS systems are no longer sufficient to defend against...
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and...
Organizations are eager to harness the power of big data. But as new big data opportunities emerge, ensuring the veracity and security of source information becomes
exponentially more difficult. If these challenges are not addressed directly, end users will lose confidence in the insights generated from big data. As...
Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.
A breach of an U.S. Office of Personnel Management system used to conduct security clearance background checks exposed the personal information of 21.5 million individuals, the agency announced July 9.
FBI Director James Comey says the White House plans to confirm that the U.S. Office of Personnel Management data breach exposed "millions and millions" of background-check records. Meanwhile, a second union has now sued OPM over the breach.
Although they apparently weren't caused by cyber-attacks, the impacts of computer failures at the New York Stock Exchange, United Airlines and the Wall Street Journal have much in common with the aftermath of breaches.
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
Highly publicized payment card breaches affected millions of consumers in 2014. In the wake of these breaches, retailers, financial institutions, payment processors and credit card brands responsible for delivering these systems in the United States are facing more scrutiny than ever before and are meeting at a...
Recent high-profile breaches at nationwide retail, healthcare, entertainment, public sector and financial service organizations has brought heightened attention from lawmakers in Congress and the Obama Administration. This growing focus on cybersecurity and data breaches, coupled with a growing sense of...
Threat intelligence is only useful if you can take action quickly to protect networks, systems and data. Organizations today are challenged with a high volume of security
events produced by the ecosystem of their non-collaborative security solutions. It is not a question of receiving intel on attacks, but rather:...
FBI Director James Comey says he has faith in American technological ingenuity to overcome obstacles and give law enforcement the ability to access and decrypt data on the devices of criminals and terrorists.
The Mumbai-based SEBI has issued new guidelines to the country's stock exchanges to develop a cybersecurity and cyber resilience framework to protect the securities market from cyber-threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.