Three recent privacy incidents at health insurance exchanges, including one in Vermont, involved consumers getting the wrong person's data. Privacy experts offer insights on lessons learned.
The emergence of attackers-for-hire is a troubling trend in cybercrime, and one particular group is changing its techniques to gain access to computer systems, says Symantec researcher Kevin Haley.
NIST will soon start writing the "final" version of its cybersecurity framework, a guide to information security best practices for operators of the nation's critical infrastructure. But should it be beta tested?
With cyber attacks on the rise, many organizations rely on intrusion prevention systems (IPS) to detect and stop attacks in their networks. But to counter increasingly sophisticated threats, IPS is now evolving into next-generation intrusion prevention systems (NGIPS). What drives the need for these new systems? And...
WhiteHat's Website Security Statistics Report (13th EDT) provides a unique perspective on the state of website security and the issues that organizations must address to avert attacks. Website security is an ever-moving target. New website launches are common, new code is released constantly, new web technologies are...
The financial services industry will make wider use of data analytics next year as the value of leveraging big data to help prevent or detect fraud becomes more clear, experts predict.
ATM cash-outs and card-skimming schemes are getting more difficult to detect because today's attacks are global, coordinated and sophisticated, says ATM security expert Chuck Somers.
The White House is intensifying its effort to get federal agencies to adopt continuous monitoring and move away from the paper-based checklist compliance they've followed for a decade under the Federal Information Security Management Act.
Business associates have been involved with fewer major health data breaches so far this year, compared with 2012. Are they getting better at prevention, or are they just under-reporting breaches?
Attempts to shame China haven't been effective in stopping that country from pilfering intellectual property from the computers of American companies, according to a new report to Congress from a special commission.
Application white-listing is the number one strategy in Australia's Defence Signals Directorate (DSD) list of 35 Strategies to Mitigate Targeted Cyber Intrusions; it is deemed an essential control. Application white-listing gives administrators visibility and control over applications that are allowed to communicate...
Mobile banking continues to gain momentum, growing faster than any other delivery channel to date. Many financial institutions want to expand capabilities in the mobile channel, but are concerned about security. Given the evolving threats, mobile innovation has outpaced the industry's appetite for deploying new...
A ransomware campaign has targeted millions of bank clients in the U.K., and experts warn of a worldwide surge in attacks. They say banking institutions have to be diligent about informing customers of the risk.
Jeh Johnson has cleared a major hurdle to becoming the next Homeland Security secretary and a chief advocate for the administration's cybersecurity policies. But it's unclear when the full Senate will vote on his nomination.
Figuring out how Edward Snowden breached NSA computers is sort of like solving a puzzle. Take public information and match it with an understanding of how organizations get hacked, and the pieces seem to fall into place.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.