Today's enterprise consists of numerous applications and a large number of them handle credit card data. As a result of standard processing, it is often the case that credit card data gets stored within file systems and databases in clear text - which poses a huge security risk. It is vital that all occurrences of...
When struck by DDoS, how - and what - should banking institutions communicate with their customers? Doug Johnson of the American Bankers Association advises on post-attack disclosure obligations.
The attackers' so-called Brobot, which on March 12 struck six banks, is growing, experts say. Yet only a fraction of the botnet's capabilities has been used. What else do the latest attacks reveal?
In recent years, enterprises and government agencies have fallen prey to a myriad of successful cyber attacks of unprecedented sophistication and reach. Despite spending over $20 billion annually on traditional security defenses, organizations find themselves battling a new generation of cyber attacks, such as...
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more...
The bill's chief sponsor says agencies struggle with cyberthreats. "This update to FISMA will incorporate the last decade of technological innovation, while also addressing FISMA shortcomings realized over the past years." Rep. Darrell Issa says.
From managers who steal to innocent employees who are duped, the insider threat is evolving. Researchers Dawn Cappelli and Randy Trzeciak share their latest insight on malicious and accidental insider risks.
A software vulnerability brought down the website that gives the public access to the National Vulnerability Database, which is run by the National Institute of Standards and Technology, the U.S. federal agency that produces information security guidance.
Striking a balance between identity risk management and an excellent consumer experience is an ongoing challenge. Leading organizations are turning to sophisticated data resources to effectively combat fraud, assess compliance, and verify identities.
This whitepaper is a practical guide to leveraging innovations in...
Six leading U.S. banks were hit March 12 by distributed-denial-of-service attacks, says Carl Herberger of Radware, who claims the attacks are evolving and the bot behind them is growing.
In a conversation with Chinese President Xi Jinping, President Obama raised concerns about cybersecurity, but his tone with the newly installed leader was not confrontational.
Most people will remember March 13, 2013, as the day Cardinal Jorge Bergoglio ascended to the papacy as Pope Francis. But for those who consider cybersecurity vital for society's well-being, it's an historic date as well.
More hackers are attacking payment processors and merchants with enhanced malware to compromise credit and debit card data. What steps can be taken to thwart the threat?
Mobility and privacy: Increasingly, organizations are forced to take actions on these topics. What are the latest legal and regulatory trends? Attorneys David Navetta and Ronald Raether share insights.
As distributed-denial-of-service attacks on banks continue, a U.S. electric utility also reportedly is a DDoS victim. Is this a sign that hacktivists are broadening their targets? Experts offer analysis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.