Now that Sally Beauty Holdings Inc. acknowledges that payment card data was exposed during a recent cyber-attack, experts debate whether the incident is linked to earlier retailer breaches.
Yi-Kai Liu, a computer scientist at NIST, explains how he's attempting to use quantum physics to devise a way to create a one-shot memory device that could help secure, for example, transactions or administrative passwords.
Security breaches in large enterprises make the headlines, but 55 percent of small and mid-size businesses have also experienced a data breach. And 60 percent of small businesses fail within six months of falling victim to a cyber attack.
This e-book examines the security challenges unique to mid-size...
The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organizations often lack the sophisticated defenses of large enterprises, many fail to recognize their vulnerability and are overconfident in their...
A study by Verizon finds 86 percent of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signature of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their...
As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOC) to detect and counter cyber attack, and assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement?
HP Security...
Threat Intelligence and Incident Response: A Study of U.S. and EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their companies handle the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and...
Fidelis XPS Collector provides a powerful new way of conducting incident response. By providing the ability to query and correlate historical information, and then tie it to the tuning of existing rules or the creation of new ones, Fidelis XPS Collector accelerates the process of understanding the scope of incidents...
Threat actors are constantly evolving their tactics, employing new evasion techniques, and finding new ways and methods to trick the user to exploit your network infrastructure. While there have been some recent instances of purely destructive attacks, the majority of compromises we examine are attempting to steal...
In these times of complex, advanced and persistent attacks threatening all Internet connected organizations, detecting malware and the associated activities of it is increasingly important. Defending enterprises against these kinds of adversaries is not easy. It requires a combination of people, processes and...
The most important thing to understand about dealing with a true advanced persistent threat (APT) is that it's like having pneumonia; by the time it's diagnosed you've probably had it for a while - sometimes a long while. It's often not easy to cure, and if you try to cure it without the right medication, it can...
Lost or stolen devices represent one of the leading causes of data breaches, and agencies need to take proactive measures to mitigate this risk.
Learn how the District of Columbia National Guard (DCNG) was able to leverage device tracking technology to maintain a continuous connection with every device issued, which...
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Leading this week's industry news roundup, Fortinet has expanded its distributed-denial-of-service attack detection and mitigation product line, while Lockheed Martin has acquired Industrial Defender.
One key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.