Yes, there is a global security staffing shortage. But what is the cause, and what can be done to address the crisis? Hord Tipton of (ISC)² offers his take on key issues facing the profession.
Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.
The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.
Sony Pictures says it is "investigating an IT matter" following news reports that the company has been hit by a widespread cyber-attack that affected employees' computers and may have exposed sensitive data.
On average, organizations take 229 days to detect a data breach, research shows. Experts offer insights on the key steps to take to speed up the detection of intrusions and minimize the damage.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
Less than 48 hours after warnings first surfaced about espionage malware called "Regin," debate rages over who's been running the related attack campaigns, for what purpose, and if anti-virus vendors should have sounded warnings more quickly.
Cybercriminals are perfecting the automated systems they use to verify stolen debit and credit card data by exploiting charitable websites. Learn why these sites are so-called soft targets for hackers.
An ongoing legal dispute between the Texas Health and Human Services Commission and its former contractor, Xerox, has led the state agency to report a breach it claims affected 2 million individuals. Learn what both sides have to say about the case.
WordPress says users of versions 3.9.2 and earlier of its website content management software need to patch a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site.
Stealth espionage malware known as 'Regin' or 'Regis' has been targeting government agencies, businesses and research institutes, with Russia and Saudi Arabia as prime targets, researchers say. But it's unclear what nation is behind the attacks.
Citadel financial malware has been upgraded to steal master passwords for software designed to securely store lists of usernames and passwords, according to IBM's Trusteer unit. Security experts offer insights on how to respond to the threat.
The Massachusetts Attorney General has fined Beth Israel Deaconess Medical Center in Boston as a result of a 2012 breach involving a stolen unencrypted laptop. Find out the size of the penalty.
A Russian website is streaming live footage accessed without authorization from cameras around the world. The exposure highlights the dangers of weak passwords and the need for organizations to vet the security settings of all Internet-connected devices.
The FDIC reveals more details about pending cybersecurity guidance that is expected to address specific types of cyber-attacks. Industry analysts say these new guidelines could signal more frequent updates from regulators.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.