Hackers stole $100 million from the Bangladesh Bank after apparently obtaining payment-transfer codes and moving the money overseas in what experts say appears to be one of the largest bank heists in history.
Because of growing cybersecurity concerns, CISOs in the financial sector finally are getting more time with their boards of directors and more direct interaction with senior executives, says John Carlson, chief of staff at the Financial Services Information Sharing and Analysis Center.
The nonstop pace of "Apple vs. FBI" updates and related crypto debates seemed to exceed both the U.S. government's and the information security industry's advanced persistent spin-cycles at this year's RSA Conference.
The Internal Revenue Service has temporarily deactivated an online PIN-retrieval tool meant to prevent stolen Social Security numbers from being used to file fraudulent returns after finding that hackers had successfully subverted the system.
The Department of Health and Human Services has a long list of information security weaknesses, including identity and access management and incident response shortcomings, that need more attention, according to a federal watchdog agency's audit report.
The Justice Department's appeal of a court order that the government can't compel Apple to unlock an iPhone used by an accused drug dealer is significant because it sets in motion a process that could lead to a Supreme Court ruling on whether mobile device makers must give law enforcement an encryption backdoor.
Lockheed Martin and Cybereason have partnered to help organizations respond faster to advanced threats with enhanced threat intelligence. Cybereason's Lior Div and Lockheed Martin's Richard Mahler discuss the power of their combined efforts in this video interview.
It's been a half-year now since Art Gilliland stepped into the role of CEO at startup security company Skyport Systems. What lessons has he learned from the marketplace, and where does he expect Skyport to make its mark? Find out in this video interview.
For years, Wade Baker was one of the main forces behind the industry's most noted data breach investigations report. Now, as vice president of strategy and analytics at ThreatConnect, he has the chance to practice the lessons he's learned, as he explains in this video interview.
The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
Former intelligence operative Will Hurd brings his CIA values, including his belief in the benefits of sharing of threat information, to his job as chairman of a House subcommittee with information security oversight. Hurd addresses a number of cybersecurity matters in a wide-ranging interview.
Threat response is a lot like physical fitness. Enterprises know what they need to do - they often just opt not to do it. RSA's Rashmi Knowles offers advice for how to move from threat prevention to response.
As a vice president at IBM Security, Caleb Barlow has been a leader in the company's strategic acquisitions. What does he look for in a potential venture, and how is IBM Security taking shape to respond to the latest threats? Find out in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.