One year after Sally Beauty Supply revealed that a network breach compromised payment card data and exposed 25,000 records, the company says it is investigating new breach reports. Did it fail to eradicate the original intrusion?
Security expert Mike Canavan of Kaspersky Lab North America pinpoints several critical security steps that organizations can take to help reduce the likelihood they'll become a victim of a hacking attack.
Knowing exactly when to share information with law enforcement in the wake of a breach is challenging, says Assistant U.S. Attorney William Ridgway, a featured speaker at ISMG's Fraud Summit Chicago on May 19.
Partners HealthCare System is the latest healthcare organizations to suffer a data breach following a phishing attack. But why did Partners wait five months to issue a breach notification, when HIPAA requires notifications within 60 days?
Partners HealthCare System announced that it is the latest healthcare organization hit by a data breach attributed to a phishing attack. The records of an estimated 3,300 individuals may have been compromised in the incident.
Privacy advocates in the Senate have introduced a national data breach notification bill that would allow states to keep their own laws if they provide more stringent reporting and privacy protections than offered by the federal government.
The latest victim of malware attacks against point-of-sale system vendor NEXTEP is foodservice management company Compass Group, which says payment card data for up to 70,000 users of self-service kiosks was exposed.
Laws rarely, if ever, keep up with technology, but even if they could, the consequences could prove more harmful than the benefits. That was evident at a House hearing that addressed default encryption of mobile devices.
After nearly 2Â½ months on the job, federal Chief Information Officer Tony Scott was reluctant to offer Congress a detailed assessment of the quality of agencies' information security until reviewing results of pending "CyberStat" reviews.
To better secure enterprise networks, as well as detect and respond more rapidly to data breaches, businesses need to know the who, what, where, when and why of all endpoints that connect to network resoruces, says ForeScout's Sandeep Kumar.