Expect every new warning of cybercrime attacks, online espionage or the malware du jour to be slickly marketed, with the announcements carefully timed. But is this bad for either the information security community or attackers' victims?
A report that Russian hackers have hoarded 1.2 billion stolen passwords could prove to be an important catalyst for beefing up information security. Experts analyze the potential impact.
When it comes to incident response, organizations don't lack threat intelligence. They lack the automation, tools and the skilled staff to act on that intelligence, says Craig Carpenter of AccessData.
Delaware's recently enacted data destruction law sets itself apart from other regulations by permitting consumers, under certain circumstances, to file civil lawsuits against those who violate the law's requirements.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
A new report from Trend Micro finds that network vulnerabilities related to backdoor applications and remote access are putting more businesses at risk. What mitigation steps should be taken?
Unix systems face special identity and access management (IAM) challenges.
Read this informative white paper to:
Learn about those issues;
Find out how to overcome them with the right practices and tools;
Enhance security, achieve compliance and improve operational efficiency.
Much of the focus of identity and access management (IAM) is concerned with easy and unobstructed access to a large population of end users with minimal disruption to IT operations. But the forgotten arm of IAM remains privileged account management (PAM).
Read this e-book to:
Discover why PAM can be a prime...
A Russian cyber gang has breached over 420,000 web and FTP sites to pilfer over 1.2 billion credentials, according to Hold Security, saying it discovered "what could be arguably the largest data breach known to date."
U.S. officials have confirmed the existence of a new leaker exposing national security documents, CNN reports. The leak apparently involves documents prepared by the National Counterterrorism Center.
Target Corp.'s net breach expenses not covered by insurance are expected to total $146 million for its most recent three quarters following the company's massive December 2013 data breach that compromised payment card information.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Organizations can substantially benefit by having a process in place for the use and management of administrative privileges.
Read this white paper for tips on:
Developing and enforcing policies for privileged accounts;
Minimizing the use of shared administrative accounts;
Verifying the privileges...
P.F. Chang's China Bistro now says a breach of its card processing system may have resulted in the theft of customer payment card information at 33 of its 210 U.S. locations. Security experts question why so few of the locations were affected.
Among the major data breaches reported during the week of July 28 was an incident at Irish online gambling site Paddy Power that impacted 650,000 customers. View this week's infographic of the top five breaches for the week.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.