The Latest News
-
Obama Issues Cybersecurity Exec Order
President Calls on Congress to Enact IT Security LegislationPresident Obama, in his State of the Union address, says the executive order will strengthen the nation's cyberdefenses by increasing information sharing with business and developing standards to protect national security and privacy. Read more...
-
Article
ID Theft Incident Leads Breach Roundup
Employee Stole Information on 2,800 Patients By Jeffrey RomanIn this week's breach roundup, read about the latest incidents, including an ID theft case at a Florida health department, and a security technology vendor hit by a breach.
-
Article
Hacktivists Threaten More DDoS Attacks
Banking Institutions Warned to Look Out for Fraud By Tracy KittenThe hacktivist group Izz ad-Din al-Qassam Cyber Fighters warns that DDoS attacks against U.S. banks could resume soon. What tips do security experts offer for DDoS detection and response?
-
Article
$200 Million Card Fraud Scheme Alleged
18 Arrests in Global Case that Reveals Cross-Channel Gaps By Tracy KittenHow could 18 people pull off an alleged international bank fraud scheme involving 25,000 fake cards and $200 million in losses? One expert tells how banks can bridge the gaps that hide such scams.
-
Article
EU Unveils New Cybersecurity Policy
Directive Would Require Online Entities to Report Cyber-Attacks By Eric ChabrowThe new measure would require banks, healthcare providers, social media companies, search engines and other e-commerce entities operating in Europe - even those based elsewhere - to report breaches to national authorities.
-
Article
NIST Updating Security Controls
Final Draft Issued of Revisions to Special Publication 800-53 By Eric ChabrowRon Ross, the NIST computer scientist who heads the initiative that is revising the guidance, characterizes the updated publication as the most comprehensive one since the initial catalogue of controls was issued in 2005.
Featured Interviews
-
PCI Council Issues Cloud Guidance
How to Minimize Risks to Card DataOutsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
-
DDoS: Are Attacks Really Over?
Expert Says Attacks Likely After More than PublicityAlthough hacktivists announced suspension of DDoS attacks against banks, other industries are now getting hit, and banks can't afford to get complacent, says security specialist Bill Stewart.
Webinars
-
Third-Party Service Providers (TSPs) - Breach Impact & Preparedness
In Sept. 2011, the U.S. Defense Department's TRICARE health program notified 4.9 million beneficiaries of a data breach caused when backup tapes were stolen from the car of an employee of Science...
-
Optimizing and Safeguarding Your Data Network
Computer networking is an integral focal point of virtually every business. Unfortunately, the ability to understand and identify the traffic flowing across the network has been somewhat of a...
White Papers
-
Nine Critical Threats Against Mobile Workers
Criminals, hacktivists and hostile governments understand that the quickest way to corporate data is through mobile workers' unsecured endpoints. Cyber criminals targeted mobile devices at...
-
What's Your Organization's Plan When Malware Sneaks in?
A full 60% of organizations haven't done the basics. Read this ESG Brief, Advanced Malware Protection Must Extend to Incident Detection and Response, and discover: How your organization's...
The growth in messaging technologies has fraudsters targeting new channels to attack organizations....
Latest Tweets and Mentions
The growth in messaging technologies has fraudsters targeting new channels to attack organizations....
The ISMG Network
-
Webinar
Dept. of Health & Human Services HIPAA Audits: How to Prepare
-
Blog
State of the Union: Cybersecurity Word Count
Size Counts - Obama More Verbose in His Defense of Cyber
-
Article
Is Compromise in Offing for CISPA?
Sponsors See Hopeful Signs Emanating from the White House
-
Article
Addressing BYOD in Healthcare
Federal Adviser Lists Top Recommendations
-
Interview
HIPAA Omnibus: The Liability Chain
Expert Explains Compliance Flow
-
Whitepaper
The New Cybercrime Battle Basics: Learn to Defend Your Company from New Online Fraud Threats
-
Article
CISOs and the BYOD Challenge
Top-of-Mind Concerns to Address in 2013
-
Article
Career Transitions: Making Big Moves
How Two Financial Security Experts Made Career Shifts
-
Blog
Skills Gap: Not Just a Technical One
U.K. Report: Shortage Hampers Ability to Protect Netizens
-
Blog
HIPAA Omnibus: 5 Compliance Tips
Insights on Taking Quick Action