After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
In the wake of a data breach that followed a routine regulatory, a former regulator is asking why the agency failed to disclose the breach sooner, and why it has not accepted more responsibility for its error.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
The Department of Veterans Affairs, in a cryptic message, disclosed a potential security flaw that exposed the personally identifiable information of 7,054 veterans in a patient database belonging to and managed by a vendor that provides home tele-health services to the VA.
A new report now claims the breach at JPMorgan Chase is linked to a server the bank's security team overlooked when upgrading to two-factor authentication controls. Why that oversight and a well-planned spear-phishing attack were all hackers needed.
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
A week after Sony Pictures canceled the release of the upcoming film "The Interview," the studio is now planning a limited run of the movie. Also, a congressman has sent a letter to Sony requesting details on the cyber-attack.
In determining the right time to issue a breach notification, organizations have to carefully weigh the risk of premature notification based on insufficient facts versus tardy notification that can have an impact on their reputation.
Sony Pictures in late November suffered a significant cyber-attack that led to intellectual property and personal employee details being leaked online. The following infographic provides an overview of the events leading up to, during and after the breach.
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
A federal judge has denied Target's motion to dismiss a consolidated class action lawsuit filed on behalf of consumers affected by the retailer's December 2013 data breach. The move follows a similar ruling regarding a class action lawsuit involving banks.
North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
The five biggest 2014 health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, from hacker attacks to missteps by business associates.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.