-
Intruders accessed names, Social Security numbers, birth dates, addresses and driver’s license numbers, the company said.
September 7 -
A recent survey on how well prepared organizations are to protect their systems from a breach was 'eye-opening and disturbing,' says Martin Veitch.
August 31 -
DR planning is a critical component of every information management strategy, even if the data center is in the cloud.
August 25
NetApp -
The number of incidents has risen rapidly in recent years, but organizations are learning from their mistakes and making improvements.
August 22
Mirick, O'Connell, DeMallie & Lougee, LLP -
Leading organizations embrace information security from the top down, and employees are given the right resources to defend against a breach.
August 21 -
The latest mandate encourages greater sharing of data between public and private organizations, and establishes protections of privacy and liability for those sharing the information.
August 18
Cyber Analytics Institute -
Carrier is required to pay $5.5 million, employ two breach specialists in its IT department and conduct audits of its systems yearly.
August 11 -
SOCs devote 50 percent more time than their counterparts on actual threat hunting, according to a new study from McAfee.
August 11 -
Firms should be looking at whether they have the right culture and people in place to understand data and how to best keep it safe.
August 9
Corax -
Researchers have seen at least three cyber espionage operations using this technique, says Alexey Shulmin of Kapersky Lab.
August 8 -
The Internet of Things Cybersecurity Improvement Act of 2017 calls for Internet-connected devices to be patchable, meet minimum data safety standards and have changeable password capability.
August 4 -
Forensic study finds an employee of a business associate of the insurer accessed PHI.
August 2 -
Ease of communicating biological data can impact access control and underwriting, experts say.
August 1 -
The rampant proliferation of easy-to-use hacking tools and number of bad actors willing to deploy them means that everyone needs to 'up their game' to stay safe.
July 31
CACI International -
Nearly half of organizations are adding these professionals to payroll, but perhaps even more sought-after is the CDO.
July 28 -
New Jersey insurer becomes the organization's 50th industry sponsor in hopes of forging new relationships with up-and-coming startups.
July 24 -
Following a cyberattack, the things an organization should not do often go overlooked. Company leaders could end up spreading the fire, rather than smothering it, says John Suit.
July 21 -
A majority of IT professionals still think perimeter security is effective at keeping unauthorized users out of their networks, a new study reveals.
July 12 -
New York law will have ripple effects on insurers around the country.
July 7
Novarica -
While many computer systems have been patched up to protect against malware such as WannaCry, this new infection has additional capabilities that let it spread by other means.
June 29












