A week after Sony Pictures canceled the release of the upcoming film "The Interview," the studio is now planning a limited run of the movie. Also, a congressman has sent a letter to Sony requesting details on the cyber-attack.
In determining the right time to issue a breach notification, organizations have to carefully weigh the risk of premature notification based on insufficient facts versus tardy notification that can have an impact on their reputation.
Sony Pictures in late November suffered a significant cyber-attack that led to intellectual property and personal employee details being leaked online. The following infographic provides an overview of the events leading up to, during and after the breach.
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
For the second time in less than a month, the Massachusetts attorney general has fined a hospital for a data breach - this time Boston Children's Hospital. Learn why experts expect to see more state and federal breach sanctions in 2015.
The Internet reportedly went dark in North Korea on Dec. 22, days after President Obama pledged there would be a "proportionate response" to the cyber-attack on Sony Pictures Entertainment that the FBI blames on the North Koreans.
A federal judge has denied Target's motion to dismiss a consolidated class action lawsuit filed on behalf of consumers affected by the retailer's December 2013 data breach. The move follows a similar ruling regarding a class action lawsuit involving banks.
North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
The five biggest 2014 health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, from hacker attacks to missteps by business associates.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?