In this week's breach roundup, read about the latest incidents, including a breach at Educause that exposed hashed passwords, and a theft at Crescent Healthcare's billing center that involved patient data.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
Your organization has been attacked or threatened, and you can trace the actor. Should you "hack back" in response? Two noted information security and privacy attorneys discuss the merits of active defense.
The Department of Health and Human Services is working with private sector healthcare groups, such as HITRUST, to facilitate more sharing of cybersecurity threats and remedies, says HHS' CISO.
More than merely a phishing incident, a targeted attack is part of an advanced persistent threat. How can organizations defend against these attacks? Kevin Epstein of Proofpoint offers insight.
The number of individuals affected by health data breaches substantially declined in 2012, the federal tally shows. Find out what experts say about emerging threats for the year ahead.
The National Credit Union Administration is the second federal regulator to issue a warning about fraud risks linked to DDoS. One legal expert says banking institutions must heed the warning.
In this week's breach roundup, read about the latest incidents, including a network intrusion compromising customers of a New York utility company and a laptop stolen from a hospice employee's car.
Seven banking institutions that are seeking recovery of losses suffered after Heartland's 2008 breach have appealed a lower court's dismissal of their negligence claims against the N.J. processor.
Security researchers warned Internet users against visiting NBC.com, saying that hackers added links to the Citadel malware on the U.S. TV network website.
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
For years, security and business managers have known that identity and access management (IAM) must be driven by business requirements. But typically, IAM processes are too IT-centric, and don't meet the needs of the business. In addition, traditional IAM systems have consistently been prohibitively expensive to...
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
In this week's breach roundup, read about the latest incidents, including an ID theft case at a Florida health department, and a security technology vendor hit by a breach.
Some of the largest banks in the U.S. were unable to ward off sophisticated DDoS attacks, so what can smaller organizations do? Plenty, says Marty Meyer, President of Corero Network Security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.