Who's behind the International Monetary Fund breach? Some observers suggest the attack could have been waged by a government to access confidential information about the financial stability of certain global markets.
The growth of the Advanced Persistent Threat has led to breaches in the Department of Defense, particularly in software penetration, enabling hackers to get into government systems and applications.
Fortify's podcast on NDAA and APT, presented by Public Sector President Kelly Collins and Federal Division CTO Rob Roy,...
White House sees the elimination of half of the federal government's 2,000 top-level .gov domains over the next year. OMB deems many sites as redundant, outdated and hard to use with poorly maintained content.
FDIC examiner Donald Saxinger says cloud computing can pose challenges when it comes to business continuity during disasters. Proactive vendor management, he says, is the best way to address potential hiccups before they become big problems.
CEO Jack Tretton didn't minimize the breach, grouping Sony with others that have been hacked in recent weeks. "If you read the newspapers, you realize that there are companies being bombarded with people trying to hack them all the time."
Ethical hacking is becoming one of the fastest growing careers in IT security, says EC Council's Jay Bavisi. The reason: you can't protect an organization by just locking the door anymore.
NRC CISO Patrick Howard is among three information security leaders who share their experiences, approaches and challenges from battling data breach incidents that had an impact on their organizations and their careers.
Details surrounding the reported breach of the International Monetary Fund remain sketchy, but alarming. And Gartner analyst Avivah Litan believes there may be "dozens" of similar incidents that have not been disclosed.
Danish pharmaceutical company Novo Nordisk Inc. has agreed to a $1.725 million civil settlement agreement to resolve allegations that the company accessed and misused private patient information and filed false or fraudulent Medicaid claims.
If you need one more reason to take additional steps to prevent health information breaches, here's something to consider. An attorney argues that if breaches, and their high costs, are not brought under control, "I think where we are headed is to an insurance crisis."
"This is yet another [incident] in what is turning into a major 'breach streak,' which will make all of us rethink what information security really means," says Mike Urban, senior director of fraud solutions for FICO.
"Durbin, as it stands today, is very poor for the payments industry and the consumer, because it would lend itself to reducing fraud prevention and detection," says one banking/security leader about the controversial Durbin Amendment to Dodd-Frank banking reform.
"Eddie also will contribute to product strategy, marketing and technical evangelism for RSA," an RSA spokeswoman says. "This role will leverage Eddie's 20-plus years of security expertise."
After hearing objections from hospitals and physicians about a proposed "opt-in" approach to obtaining patient consent for health information exchange, the Maine legislature has passed a rewritten measure that spells out rules for an "opt-out" approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.