Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka 5 discusses how to mitigate third-party risks.
A new report from the Office of the Privacy Commissioner of Canada says gaps in carrying out security policies led to the exposure of 583,000 records last year at Employment and Social Development Canada, which administers student loans.
As the California Department of Motor Vehicles continues its investigation into a possible breach of its online payments processing system, financial services industry sources explain why a link to recent retailer breaches is unlikely.
An anti-American hacktivist group calling itself Anonymous Ukraine has posted more than 7 million credit card numbers online, but it appears unlikely most of them could be used for fraud, according to the cybersecurity firm Risk Based Security.
The website of Basecamp, which offers a project management tool, was hit with a distributed-denial-of-service attack early on March 24 in what the company describes as an extortion attempt by cybercriminals, the latest sign of a troubling trend.
Palo Alto Networks announces it will acquire the Israeli-based cybersecurity firm Cyvera, continuing the recent trend of mergers and acquisitions among cybersecurity vendors. Find out how much the deal is worth.
Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
Security experts are sizing up the challenges that would be involved in implementing a federal government proposal to continuously monitor employees and contractors with security clearances in hopes of preventing leaks of sensitive information.
The California Department of Motor Vehicles is investigating a possible credit card breach after it was notified by law enforcement authorities of a "potential security issue within its credit card processing services."
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.