Credit card details for 20 million South Koreans were allegedly compromised following the breaches of three local credit card firms. An arrest has been made in the case.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks to a 17-year-old hacker in Russia, offers an exclusive, in-depth explanation of his company's findings.
President Obama faces a dilemma in deciding whether to prohibit the National Security Agency from tinkering with encryption as one way to collect intelligence data from adversaries who threaten to harm America.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
2014 is going to be a critical year for data breach preparation and response, according to Michael Bruemmer of Experian. What are the key breach-related developments that security leaders must watch?
From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
From access controls to intrusion detection, mobility to privacy, many organizations face similar network security challenges. Isabelle Dumont of Palo Alto networks offers a new, unique approach for healthcare organizations, and the key concepts of this approach can be applied to any security environment.
Investigations and lawsuits are piling up for breached retailers Target Corp. and Neiman Marcus. Meanwhile, card-issuing banks say fraud patterns may reveal additional breaches at other well-known brands.
A bill that backers say would fortify the IT security of the nation's critical infrastructure and government by codifying, strengthening and providing oversight of the mission of the DHS has cleared its first hurdle.
Nearly a week after news broke about the Neiman Marcus data breach, the retailer's CEO today issued her first statement addressing the breach, which compromised customer credit and debit cards.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
Cybersecurity frameworks, supply chain risks and malicious insiders - these are among 2014's hot topics, according to Alan Brill at Kroll. What are the year's other key cybersecurity priorities?
The Kentucky legislation, if enacted, would require victimized state agencies to notify individuals whose personal data were exposed within 35 days of the completion of the investigation into a breach.
Undeterred, two senators will try again to get their colleagues to enact legislation that they contend would better safeguard sensitive information and notify consumers of a data breach when personally identifiable information is exposed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.