Prosecutors have charged a resident of Great Britain with hacking thousands of U.S. government computers, including those at the U.S. Army and a number of federal agencies, to steal massive amounts of confidential information.
Organizations must develop a "defensible response" to data breaches and fraud incidents because of the likelihood of a regulatory investigation or legal action, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
In this week's breach roundup, read about the latest incidents, including two thefts of portable electronic devices exposing health information and a reminder to apply security controls to employee-owned devices.
The Department of Veterans Affairs faces ongoing breach prevention challenges, according to recent investigations. Learn what the scrutiny has revealed and what the VA is doing to bolster breach prevention.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
An ENISA white paper provides guidance on securing industrial control systems and preparing an incident response plan. Learn why these systems, used in many sectors to perform repetitive automated tasks, are vulnerable to attack.
In this week's breach roundup, read about the latest incidents, including a former South Carolina state employee pleading guilty to charges stemming from a breach affecting 228,000 Medicaid recipients.
Russian authorities have reportedly arrested a man believed to be the author of the Blackhole exploit kit, widely used by cybercriminals to exploit vulnerabilities in Web browsers and other software to infect user computers with malware.