Organizations create more data than ever, and they face more requirements to collect and present it for investigations and legal cases. How do they avoid spoiling this data? Zapproved's Sarah Thompson offers tips.
Many organizations spin their wheels when it comes to cybersecurity, says IBM's Andy Land. They invest in tools that do everything except what security leaders are fundamentally tasked with doing: Protect the data.
The fraud shift as a result of the migration to EMV chip payments in the U.S. will extend beyond card-not-present payments, experts at Information Security Media Group's fraud and data breach summits in San Francisco last week warned.
For years, information security experts have been warning users to create complex, unique passwords, and organizations to secure them properly. But an analysis of 12 million cracked Ashley Madison passwords shows how much we're still failing.
A lawsuit has been filed in the aftermath of a hacker attack on Excellus BlueCross BlueShield that potentially exposed information on 10.5 million individuals. Meanwhile, an Illinois court has dismissed more claims in the consolidated case against Advocate Health in the wake of a 2013 breach.
Apple is moving to contain an outbreak of malicious apps being distributed via its official App Store that were infected with XcodeGhost malware. Hundreds of apps and millions of users were reportedly infected.
The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.
The insider threat is one that organizations often want to overlook. But it's hard to ignore when they are losing critical assets. Lockheed Martin's Douglas Thomas tells how to sell an insider threat program.
In light of the uptick in hacker attacks on the healthcare sector, Everett Clinic in Washington is making a number of additional moves to bolster its cybersecurity, says CIO Becky Hood. Find out about the top priorities.
The U.S. migration to EMV chip payment cards, which is progressing slowly, will be overshadowed by EMV-compliant mobile payments, says Gray Taylor of Conexxus, a convenience store and petroleum industry technology association.
The creation of the California Cybersecurity Integration Center demonstrates that the state is taking a proactive approach to securing its digital assets, says Mark Weatherford, a former California state CISO and onetime DHS deputy undersecretary for cybersecurity.
A second Russian has pleaded guilty in connection with the largest U.S. hacking scheme, which compromised more than 160 million payment card numbers. But three other alleged conspirators have yet to be arrested.
While covered entities and business associates are becoming more aware of the need to encrypt patient data at rest, they often overlook securing data as it's shared and received, says security expert Joe Meyer of Coalfire.
Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.