- Home
- Fraud
- ID Theft
ID Theft
The Latest News
-
Interview
New Threat: ID Theft in the Workplace
Fraud Summit Keynoter on Employer Liability By Tracy KittenAs data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.
-
Article
Agency's Response to Breach Criticized
Consideration of New Encryption Rule Called Unnecessary By Tracy KittenBankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
-
Interview
Fraud: Underground Markets Evolving
Report Reveals Trends in the Marketing of Stolen Data By Tracy KittenOver the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works.
-
Article
Identity Theft Protection: Key Steps
Tips on Making All the Right Decisions After a Data Breach By Jeffrey RomanAs part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
-
Article
Hacker Forum Member Sentenced
Bulgarian Gets 30 Months for Role in ID Thefts By Jeffrey RomanA Bulgarian who participated in the Shadowcrew forum, a now-defunct online marketplace for hacking and identity theft, has been sentenced to 30 months in prison for his role in the operation.
White Papers
-
Kroll Advisory Solutions 2013 Cyber Security Forecast
Kroll Advisory offers its annual look at what to expect in the coming year, with a bit of a twist: This year's list highlights four unexpected cyber issues that organizations are not talking about,...
-
Governing User Access: Why Provisioning-Centric Approaches Fall Short
Organizations of all sizes continue to face ever-stricter regulatory and security requirements to protect their IT assets from unauthorized use. In response, many enterprises have embarked upon...
Webinars
-
Healthcare Information Security Today: 2015 Survey Results and Analysis
What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? Join us for this webinar that will provide answers.
-
Security Alerts: Identifying Noise vs. Signals
For anyone working in a security operations center, this is a familiar picture: lots of alerts, but not enough analysts; too many disparate tools to manage effectively; not enough visibility, and too...
Canadian Internet service provider Rogers Communications has confirmed that information about the...
Latest Tweets and Mentions
Canadian Internet service provider Rogers Communications has confirmed that information about the...
The ISMG Network
-
Webinar
I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response
-
Article
Bill Altering Privacy Rule Advances
Legislation Is Designed to Boost Medical Research, Innovation
-
Article
Sally Beauty Confirms Second Breach
Retailer's Investigation of 'Illegal Intrusion' Continues
-
Interview
Art Coviello: Venture Capitalist
Ex-RSA Chairman Joins Rally Ventures as Partner
-
Article
House Votes to Ban NSA Bulk Collection
USA Freedom Act Passes by Wide Margin
-
Article
FTC's LabMD Case: The Next Steps
Commission Won't Call Rebuttal Witness
-
Article
The Challenges of Securing Smart Cities
Middle Eastern, Asian Leaders Align with Security Frameworks
-
Interview
Qatar Builds on Information Assurance
QCERT's Ismael on How IA Helps CISOs Manage Risks
-
Blog
Government Critic Gets White House Role
Princeton Professor Ed Felten Is New Federal Deputy CTO
-
Interview
Saudi Banks: Lessons from Attacks
Banque Saudi Fransi's Osman on Responding to Top Threats