With economic slump, concerns rise over data theft
Is the worsening economic situation going to turn some employees into data thieves?
View ArticleSpecialist London police squad to tackle business data theft
A specialist police squad is being established to help businesses in the City of London tackle data theft.
View ArticleGonzalez sentenced for multimillion-dollar credit card scam
As his parents and sister silently wept, hacker mastermind Albert Gonzalez was sentenced Thursday in U.S. District Court to two concurrent 20-year stints in prison for his role in what prosecutors...
View ArticleApache project server hacked, passwords compromised
Hackers broke into a server used by the Apache Software Foundation to keep track of software bugs.
View Article27 million South Koreans affected by data breach
South Korean authorities have revealed details surrounding massive data breach that impacts 27 million people aged 15-65. The compromised data comes from website registrations for various games and...
View ArticleHealthcare data and data breaches: A second opinion:
We've barely begun 2015, yet some security predictions made at the end of last year are already being tested. One of those was a prediction by RSA that criminals will turn their attention to stealing...
View ArticleIn Pictures: 7 steps to protect your business from cybercrime
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should...
View ArticleBreaking the Kill Chain: Protecting Against the Known and the Unknown
Data theft is big business. More than 1.3 billion records have been exposed in the last two years. The threat evolution is faster than ever – we are, on average, discovering more new threats every day...
View ArticleRole-based Access Control: Access, security, info tracking
Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many...
View Article‘Hunted’ to ‘Hunter’, Reactive to Proactive Security
It is an unfortunate reality that attackers are becoming far more successful at stealing data and personal customer information from businesses around the world. In October, we saw one of the most high...
View ArticleMicrosoft to admins: don’t demand long, complex and frequently changed passwords
Microsoft has warned IT admins to against policies that require passwords that are too long, require multiple character sets, and force users to change them frequently.
View ArticleRussian hackers breach DNC computers, steal data on Trump
Hackers were looking for campaign strategies and policies
View ArticlePolicing the data lake
Every organisation is facing a new set of security challenges as they amass data says Nuix's Jim Kent.
View ArticleResilience and intelligence are key to infosec success
One of the key themes coming from this year’s Risk Management and Security Summit, held by Gartner, is that the battle against cybercrime and data theft is as much about resilience and detecting...
View ArticleProtecting your reputation following a data breach
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will...
View ArticleCyber Terrorism - The Final Frontier
A hospital staff member, expecting delivery of an online purchase, opens an email claiming to contain details of a parcel delivery.
View ArticleTribunal rules UK surveillance was illegal for over a decade
As the UK prepares for new surveillance laws, a court has ruled that prior bulk communication data collection was being conducted illegally between 1998 and 2015.
View ArticlePrivacy and the right to be 'left alone'
Imagine life without our smartphones, tablets, digital televisions and the Internet. We would still be stuck in the early 90s.
View ArticleRole-based Access Control: Access, security, info tracking
Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many...
View Article‘Hunted’ to ‘Hunter’, Reactive to Proactive Security
It is an unfortunate reality that attackers are becoming far more successful at stealing data and personal customer information from businesses around the world. In October, we saw one of the most high...
View Article
More Pages to Explore .....