Arts and crafts retailer Michaels is looking into a possible data breach that may have led to fraudulent activity on U.S. payment cards. But experts disagree about whether there's a connection to the Target and Neiman Marcus attacks.
The takedown of a counterfeit payment card website was enabled by collaboration between the FBI and the United States Postal Inspection Service. Learn why experts say more of this kind of dual-agency work is needed.
In 2013, attackers proved that sophisticated DDoS attacks could be launched as effective disruptions and distractions. What are the evolving solutions that now help organizations mitigate these strikes?
From access controls to intrusion detection, mobility to privacy, many organizations face similar network security challenges. Isabelle Dumont of Palo Alto networks offers a new, unique approach for healthcare organizations, and the key concepts of this approach can be applied to any security environment.
A stolen unencrypted laptop recently led to one of the largest health data breaches ever reported in Canada, a nation that lacks federal notification guidelines. Find out how many individuals were affected.
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.