Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.
The malware attack that infiltrated Harbor Freight Tools' network could prove to be one of the biggest retail breaches this year, experts now say. Learn why card fraud linked to the attack is expected to grow.
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.