Israeli Prime Minister Benjamin Netanyahu may have been a bit premature to claim Israel has deployed a cyber "iron dome" to protect its critical IT and defense systems. But a new initiative under way will try to do just that.
C&K Systems, the vendor identified by Goodwill as the source of a breach that impacted about 330 of its stores, has confirmed details of the 18-month breach of its "hosted managed services environment" affecting three of its clients.
Experts review new allegations that have emerged about information security practices at Home Depot in the wake of the retailer confirming that it suffered a data breach resulting in the theft of an unknown quantity of credit and debit cards details.
What's the toughest challenge the U.S. faces when it comes to EMV? Randy Vanderhoof of the EMV Migration Forum points to getting POS software and terminals certified for EMV transactions. Find out what other hurdles he identifies.
Helping merchants deal with the growing threat of POS malware is one of the biggest challenges facing Troy Leach, CTO of the PCI Security Standards Council, who says the BlackPOS malware threat, in particular, "is keeping me up at night."
The Office of Personnel Management's decision to stop using U.S. Investigations Services for certain security clearance services, which came a month after a breach of company computers, could be as much a reflection on OPM as it is on USIS.
Diatherix, which provides clinical laboratory testing services, reports a breach involving PHI accessible via the Internet, while Temple University Physicians says the theft of a computer has potentially exposed patient data.
In hopes of getting stalled national data breach notification legislation moving in Congress, two senators have asked Home Depot and Apple Inc. to brief lawmakers on the circumstances behind their recent breaches.
Google says just 2 percent of the recent dump of nearly 5 million credentials to Russian cybercrime forums contained valid Gmail username and password combinations. But anyone who reused the same passwords on other sites remains at risk from hackers.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.