Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market.
Gartner notes that, "Archiving as a...
The use of social media in the work place is growing rapidly. However, management of social media and archiving of its content has not kept pace with the rapid growth in its use. The result has been a number of problems for which most organizations are inadequately prepared.
Read this Osterman Research white...
The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users' psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a month after it...
Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and...
Proactively managing information within financial services has never been more important - and more challenging - than it is today. Tumultuous global financial conditions have given rise to two powerful - and sometimes conflicting - objectives: 1) to address data proliferation inside their firms, and 2) to enhance...
A week after Sony Pictures canceled the release of the upcoming film "The Interview," the studio is now planning a limited run of the movie. Also, a congressman has sent a letter to Sony requesting details on the cyber-attack.
In determining the right time to issue a breach notification, organizations have to carefully weigh the risk of premature notification based on insufficient facts versus tardy notification that can have an impact on their reputation.
Sony Pictures in late November suffered a significant cyber-attack that led to intellectual property and personal employee details being leaked online. The following infographic provides an overview of the events leading up to, during and after the breach.
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
A federal judge has denied Target's motion to dismiss a consolidated class action lawsuit filed on behalf of consumers affected by the retailer's December 2013 data breach. The move follows a similar ruling regarding a class action lawsuit involving banks.
North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
The five biggest 2014 health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, from hacker attacks to missteps by business associates.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.