New NIST guidance is aimed at helping organizations to better understand the risks associated with the information and communications technology supply chain, says Jon Boyens, a NIST senior adviser.
Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.
The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.
The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
Singapore-based Singtel, Southeast Asia's largest telecommunications company, has entered a definitive agreement to acquire U.S.-based managed security services company Trustwave for $810 million.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president's schedule, CNN reports.
In the first three months of 2015, the number of information security analysts in the United States grew at a much stronger pace than other occupations within the information technology sector.
We all know that breaches and cybersecurity are topics of boardroom discussion. But how should security leaders present them to their boards? Jim Anderson of BAE Systems Applied Intelligence offers tips.
The RSA Conference is nearly a quarter-century old. What is the legacy of this event, and how is it flourishing in new geographic regions? Art Coviello, former chairman of RSA, reflects on the event's impact.
RSA Conference 2015 is expected to be the biggest gathering in the event's history. What's new at this year's event, and how can attendees get the most out of it? Program chair Hugh Thompson shares tips.
The Health Information Trust Alliance is attempting to launch a study, fueled by anonymized data gathered from healthcare organizations, to get a better understanding about the severity and pervasiveness of cyber-attacks in the sector.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
The more organizations structure business and processes around online identities, the more they navigate in tricky legal waters, says attorney Tom Smedinghoff, who offers guidance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.