Bashas' network attack highlights how PCI compliant companies can still be breached. So what steps should merchants take to ensure better security, and how should banks help them?
DHS's Bruce McConnell sees a cybersecurity framework in which the owners of critical infrastructure promise the American people they guarantee a specific level of service in the face of cyber-attacks.
Compromise - a rare word heard between Capitol Hill and 1600 Pennsylvania Avenue - is being bantered about as the first major cybersecurity bill of the new Congress is introduced.
How could 18 people pull off an alleged international bank fraud scheme involving 25,000 fake cards and $200 million in losses? One expert tells how banks can bridge the gaps that hide such scams.
President Obama, in his State of the Union address, says the executive order will strengthen the nation's cyberdefenses by increasing information sharing with business and developing standards to protect national security and privacy.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
The compromise of hundreds of payment cards, apparently tied to fraud worldwide, has been linked to a network hack affecting an Arizona supermarket chain. And the attack involved a new kind of malware, the chain says.
Visa recently warned card issuers to be on the lookout for an upswing in ATM cash-out schemes. But what can be done to thwart this type of fraud? A Visa executive provides specific tips.
The new, much more objective guidance for reporting breaches that's included in the HIPAA omnibus rule will result in an increase in notifications, predicts privacy law expert Marcy Wilder.
ISACA, the global IT association, recently released COBIT 5 for Information Security - new guidance aimed at helping security leaders use the COBIT framework to reduce their risk profile and add value to their organizations. Join two ISACA leaders for an insider's look at how to use COBIT 5 for Information Security...
New PCI data security guidance for e-commerce advises merchants to step up compliance efforts in the online environment to ensure card data is protected across the payments chain.
Smaller companies are among the business associates and subcontractors most likely to face the biggest hurdles in sorting through the new compliance requirements of the final HIPAA omnibus rule.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.