Account takeover techniques are getting more sophisticated; new "account checkers" are helping hackers automate their processes. The trend is just one more reason why we need advanced forms of authentication.
White House Cybersecurity Coordinator Michael Daniel sees significant savings in continuous diagnostics because the automated approach to identifying systems vulnerabilities could replace costly checklist compliance reporting.
Because mobile payments are so new, banking institutions worldwide are still trying to understand which threats to address first, says payments fraud expert Neira Jones.
Here's an argument for why recent indictments linked to what's been called the largest-ever card fraud scam won't deter fraud - and why improved security is a better deterrent.
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
What are the emerging security vulnerabilities for mobile devices? Anti-phishing expert Dave Jevans provides insights based on new mobile threat research.
New state health insurance exchanges will face many security and privacy hurdles. But ensuring that consumer information is secure with data handlers on the front end is a critical first step.
What are the top three cybersecurity game changers, and what negative impact can they have on organizations if security leaders do not manage them properly? Rolf von Roessing of ISACA shares insight.
Spear-phishing attacks are up and targeting individuals across all industries, according to a new warning from the FBI. Security experts advise how organizations can better detect and prevent attacks.
New guidelines for mobile security are likely on the way for U.S. financial institutions, banking leaders and mobile experts say. Learn the reasons behind their predictions.
Most organizations rate their mobile device security efforts as poor, in need of improvement or just adequate, according to the latest ISMG survey. So where are the security gaps? Malcolm Harkins of Intel offers insights.
Although major healthcare data breaches appear to be on the decline this year, losses and thefts of unencrypted devices continue to be a problem. Bill Lazarus of Stanford Medicine explains how his organization is tackling the issue.
How times change. The original guidance focused on PDAs and cell phones; the new guidance ignores those devices as it addresses how to integrate smart phones and tablets securely into the enterprise.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.