A stolen unencrypted laptop recently led to one of the largest health data breaches ever reported in Canada, a nation that lacks federal notification guidelines. Find out how many individuals were affected.
In 2013, attackers proved that sophisticated DDoS attacks could be launched as effective disruptions and distractions. What are the evolving solutions that now help organizations mitigate these strikes?
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.
The healthcare industry is becoming a bigger target for cybercriminals, so cyber-attack drills planned for this year are an important step toward identifying security best practices, says Ray Biondo, CISO of insurer Health Care Service Corp.
Evidence is mounting that the breaches reported by Target and Neiman Marcus are part of a wider assault against U.S. retailers. Meanwhile, payment card-issuing institutions say they're taking proactive steps to keep fraud at bay.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks to a 17-year-old hacker in Russia, offers an exclusive, in-depth explanation of his company's findings.
President Obama faces a dilemma in deciding whether to prohibit the National Security Agency from tinkering with encryption as one way to collect intelligence data from adversaries who threaten to harm America.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.