The primary approaches used to fight advanced threats over the past several years simply aren't effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated...
Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to corporate information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the corporate network than a...
Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective.
In Advanced Persistent Threats (APTs) and targeted attacks, attackers use a myriad of tools and techniques to breach into an...
In today's mobile world, enterprises want engaged and connected employees. That's one of the
reasons they are letting employees use their own devices to access email. People who can
access work from a personal device are always going to be connected to the office. However, the
most popular smart phones are not...
A new $800,000 HIPAA settlement between federal regulators and an Indiana community health system is another reminder that protecting paper patient records is just as important as safeguarding electronic records. Find out the settlement details.
Current and former patients of a New York radiology practice are being notified that a former staff radiologist acquired protected health information from the practice's billing systems without authorization.
A DDoS attack and subsequent data breach that led to the shuttering of source code hosting firm Code Spaces offers an eye-opening reminder to be aware of attacks used as a diversionary tactic to draw attention away from devastating hacking.
An insurance company that provided general liability coverage to Michaels Stores is asking a court to rule that it's not responsible for covering any of the retailer's breach-related lawsuit expenses.
In this week's breach roundup, read about the latest incidents, including the arrest of a suspected member of the NullCrew hacktivist group in connection with an attack against a third-party supplier for Bell Canada.
Several U.S. card issuers confirm that new alerts from Visa suggest the P.F. Chang's China Bistro breach could date back to September 2013, some two months before the attack that compromised Target.
The last two years have seen the largest "mega" data breaches in history. In an attempt to better understand the effects these data breaches have on consumers. A study conducted by the Ponemon Institute, surveyed consumers on a variety of topics related to their feelings and behaviors in the wake of being a data...
Despite being a top priority for the Obama administration and leadership in Congress over the past year, legislation to establish a national data security and breach standard remains undefined. Instead, risk managers and legal professionals are faced with a rough patchwork of state and sectoral laws - each with its...
The risk of exposing personally identifiable information (PII) and protected health information (PHI) has many consumers reluctant to fully utilize and access the online health services and resources (eHealth) available, according to a study, Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes...
As the era of big data continues to march forward, so does the number of data breaches. In fact, studies indicate that companies are attacked an average of almost 17,000 times per year, and many of those attacks result in a quantifiable data breach.
With this reality facing us, many security experts are...
A Tennessee man has been arrested and charged with computer hacking for allegedly conspiring to launch cyber-attacks on two universities and three companies last summer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.