The Office of the Comptroller of the Currency has released revised guidance about what banking institutions should do to address risks associated with merchant processing. It's the latest call to action from regulators in the wake of card breaches.
A Google-like search engine known as ICReach has enabled government agencies to share more than 850 billion records from phone calls, e-mails and Internet chat sessions, according to a report that cites leaked documents from Edward Snowden.
Personal data of 25,000 government employees, including undercover investigators, was likely compromised in the cyber-attack against U.S. Investigations Services, which conducts background checks for DHS other agencies, according to a news report.
What lessons can be learned from recent high-profile breaches? IT security experts John Pescatore of the SANS Institute and Ron Ross of NIST explain how organizations can work to mitigate the new-style data breach threat. Listen to the conversation.
Security intelligence firm LogRhythm has launched what it calls a "threat intelligence ecosystem" in collaboration with five other security vendors, giving customers the ability to customize the information they want in their intelligence feeds.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
As UPS Stores reveals that 51 of its locations were infected with POS malware, a restaurant in New Orleans confirms its POS system was breached using Backoff - malware about which federal authorities recently issued a warning. Experts offer analysis.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.
The breach at Community Health Systems that compromised information on 4.5 million patients was the result of hackers taking advantage of the Heartbleed flaw, according to one security vendor. Other security experts weigh in on the potential cause.
Michael Daniel explains that among his biggest challenges as special assistant to the president is fully understanding the economics and psychology behind cybersecurity, topics that few people have mastered.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.