In early 2014 the world's second-largest email service, Yahoo Mail, reported a data breach into its users' email accounts.
If you’re a US shopper, there’s almost a 50% chance that your information was compromised in the Target breach. So how can fellow retailers and other enterprises avoid this fate?
A inside look at the Kaptoxa/BlackPOS malware, which is believed to be used in the massive Target data breach, with the goal of understanding how it operates and finding ways to detect its network activity.
Hackers broke into The Washington Post's servers earlier this week and gained access to employee credentials. Unfortunately, this was not the first time.
Let's take a fresh look at the latest healthcare data breach numbers and the most up-to-date figures available. The healthcare industry is making progress in some areas, but is overall struggling to clot the wound bleeding patient data.
The tools of encryption and key management can (and should) be applied at numerous layers of business to protect, isolate, and control data. The technology is well-know and standardized. It is predictable and manageable and in no-way should be...
In an effort to get things done, we often kick healthy security hygiene to the curb in exchange for expediency and convenience. We convince ourselves that we'll make this one exception and over time, that becomes the default mode of operation.
Protecting against insider threats and security breaches is not always easy. The infamous NSA data leaks and various well-publicized thefts of corporate resources have prompted executives to consider how best to protect their crown jewels from...
Cyber criminals don't just use MitB malware to attack financial institutions. The latest target is Steam, an online gaming platform full of sensitive data.
The infamous NSA security breach reminds us once again of the immense damage that can be caused by a single privileged user with an agenda. Privileged users, with their unlimited access to system and network resources, can access and leak all types...