The Latest News
-
Obama Raises IP Threat with China Leader
President Highlights the Importance of Addressing CyberthreatsIn a conversation with Chinese President Xi Jinping, President Obama raised concerns about cybersecurity, but his tone with the newly installed leader was not confrontational. Read more...
-
Article
How U.S. Says Producer Aided Anonymous
FBI: Ex-Producer Encouraged Hacktivist to Disrupt Tribune Site By Eric ChabrowA 26-year-old former web producer charged with helping Anonymous hack into the website of the media giant Tribune Co. provided members of the hacktivist group with log-in credentials for a computer server, according to federal authorities.
-
Article
Celebrity Breach Leads Roundup
Information Posted on Public Website By Jeffrey RomanIn this week's breach roundup, read about the latest incidents, including a federal investigation into the leak of sensitive information on 18 celebrities.
-
Article
Tips & Tools for Breach Investigations
Kim Peretti, Partner, Alston & Bird LLP By Tom FieldAttorney Kim Peretti helped put TJX hacker Albert Gonzalez behind bars, and now she is helping organizations investigate and respond to their own data breaches. What tips and tools does she recommend?
-
Article
Evernote Archiving Service Hacked
Usernames, E-mail Addresses, Encrypted Passwords Exposed By Eric ChabrowIn notifying customers of a breach, the online archiving service Evernote might have confused some customers by sending them an e-mail that contained a clickable link to be used to reset passwords - despite warning against using such links.
-
Blog
New Considerations for Breach Penalties
HIPAA Omnibus Spells Out More Details on Setting Sanctions By Rebecca HeroldThe HIPAA Omnibus Rule includes three new considerations for determining potential civil monetary penalties following a breach investigation. What are the implications for breach prevention strategies?
Featured Interviews
-
Top 4 Global Intelligence Threats
Highlights from New 2013 Global Threat Intelligence ReportSolutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and...
-
Facebook Hack: What the Breach Tells Us
Former U.S.-CERT Director Assesses the Cyberthreat EnvironmentHighly publicized breaches at Facebook, Twitter, the New York Times and other organizations in recent weeks suggest there's a new normal in the cyberthreat arena. But the onetime head of U.S. CERT,...
Webinars
-
Misplaced Trust in the Mobile Platform
Metaforic will host a mobile security webinar with an additional speaker from Forrester. The one-hour session will provide an overview of the latest mobile threats, and will discuss in detail the...
-
Third-Party Service Providers (TSPs) - Breach Impact & Preparedness
In Sept. 2011, the U.S. Defense Department's TRICARE health program notified 4.9 million beneficiaries of a data breach caused when backup tapes were stolen from the car of an employee of Science...
White Papers
-
2013 Annual Cost of Failed Trust Report: Threat & Attacks
For the first time, Ponemon Institute has quantified the staggering costs of failures in cryptographic key and digital certificate management. The First Annual Cost of Failed Trust Report,...
-
Navigate the Future of the Security Department
Is your status among C-level colleagues slipping? Are your budgetary pitches falling flat? If you've answered "yes" to either of these questions, Forrester Research, Inc.'s February 2012 report,...
The future of security in payments remains unclear, says Nicolas Vedrenne of the Merchant Risk...
Latest Tweets and Mentions
The future of security in payments remains unclear, says Nicolas Vedrenne of the Merchant Risk...
The ISMG Network
-
Webinar
Vendor Management Part I: FDIC Explains How to Manage Your Outsourcing Risks
-
Article
IRS Agents Sued in Health Records Case
Suit Alleges 10 Million Patients' Info Improperly Seized
-
Article
GAO Sees Vulnerabilities in IRS Systems
Auditor: Parts of IRS Infosec Program Haven't Function as Intended
-
Article
Incident Response: Next-Gen Skills
Evolving Threats Call for Evolving Proficiencies
-
Interview
BITS on Top Fraud Threats to Banks
New Fraud Prevention VP on Latest Trends, Strategies
-
Blog
HIPAA Omnibus: Vendor Contracts
Pay Attention to Those Business Associate Agreements
-
Whitepaper
Improving Risk Management Strategies using Identity Attributes
-
Article
DHS's Mark Weatherford Resigning
Homeland Security's Cybersecurity Leader to Join Consultancy
-
Article
Rural Providers Get HIE Help
Toolkit Addresses Privacy, Security Issues
-
Interview
Comparing Medical Devices on Security
New Tool Will Help With Assessments