The U.S. and U.K. plan to hold "cyber war games" to help them prepare for defending against online attacks. Meanwhile, hackers have targeted 19,000 French websites with DDoS attacks and defacements since the Paris massacre.
Following the Paris terror attacks, the French government plans to strengthen its surveillance laws, while the British prime minister has promised to allow intelligence agencies to penetrate any encrypted communications.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.
President Obama is proposing a national data breach notification law that would require businesses to notify consumers within 30 days of a breach, replacing the current patchwork of state requirements.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
If a hack attack the size of the Sony Pictures incident hit India, security experts warn that few of the nation's public- and private-sector organizations would have the right plans and tools in place to properly defend themselves or react.
The Reserve Bank of India is considering removal of its two-factor authentication requirement for small-value transactions. The goal: to facilitate easier transactions. But security experts fear the move may actually increase fraud.
Because the healthcare sector is a growing target for cybercriminals, organizations must implement security practices that look beyond HIPAA compliance and also address business associate risks, says risk management expert Kenneth Peterson.
At least 12 million home and small-office routers from 50 manufacturers have a flaw that an attacker could remotely exploit to seize control of the device, steal data and redirect users to attack sites, warns security vendor Check Point.
If the top breaches of 2014 taught the security world anything, it's that size and sector don't matter - all organizations are vulnerable. This infographic takes a look at the top incidents and the lessons security leaders took away from them.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.