The hack of "cheating" dating site AshleyMadison.com is a reminder that no website or personal information can be guaranteed to remain secure against determined attackers. So businesses and consumers must plan accordingly. Here are six takeaways from the incident.
The string of hacker attacks in the healthcare sector, including the UCLA Health breach, calls attention to the urgent need for organizations to step up their security programs, John Halamka, CIO at Beth Israel Deaconess Medical Center, and other security experts say.
The risks of e-commerce breaches are top-of-mind again with the news of a possible compromise of PNI Digital Media, which manages and hosts online photo services for numerous big-name retailers. How can the risks be mitigated?
After jumping by 33 percent in 2014, the number of Americans who consider themselves IT security professionals has remained flat for the first half of 2015, according to an examination of federal government employment data. That's bad news for employers seeking IT security pros to hire.
A breach of an U.S. Office of Personnel Management system used to conduct security clearance background checks exposed the personal information of 21.5 million individuals, the agency announced July 9.
A new alert from the FS-ISAC warns merchants and banks that remote-access attacks against POS systems continue to rise and offers risk mitigation recommendations. The center's Charles Bretz provides an analysis.
Covered entities find it difficult to prevent unauthorized access to patient data by members of their staffs. Preventing breaches involving insiders at business associates can be even trickier, as an incident affecting Meritus Health illustrates.
OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
Just how bad is the U.S. Office of Personnel Management breach? Consider that spies may now have access to every secret - sexual, financial, familial, medical - shared by personnel seeking security clearances to access classified U.S. information.
President Obama proposes spending more money on cybersecurity, replacing government agencies' antiquated, unsecured systems. But what really needs to be done to thwart breaches, like the hack attack against the Office of Personnel Management?
As hackers increasingly focus their attacks on the government and healthcare sectors, it's more critical to ensure that consumers' personal data is handled securely on Obamacare's HealthCare.gov website as well as state health insurance exchanges.