Nortel Networks Ltd. has been the victim of a hacking campaign for more than a decade. The campaign gave attackers access to the corporate computer network and sensitive company information, according to news reports.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Up to now, business and government have not paid much attention to hacktivists. But that's got to change. In fact, cybersecurity threats waged by hacktivists pose increasing concern.
The recent major breach at Zappos.com should lead security professionals in all industries to carefully review how much client information their organization really needs to store, security expert Fred Cate says.
Francoise Gilbert of the IT Law Group won't give Zappos an "A" for how the online retailer reacted to its recent data breach. So, what can organizations learn from the incident, so they're better prepared?
In the wake of the latest hacktivist attacks against high-profile institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
For years, security experts have advised users to wipe their hard drives before discarding them. About 100 owners of one brand of tablets may have wished they did.
Verisign Inc. may have followed the letter of the law when revealing a series of breaches in an SEC filing. But the company that assures the flow of a hefty portion of Internet traffic should have been more forthright to ease the minds of its various constituencies.
Verisign, operator of two of the 13 root name servers that route traffic on the Internet, has revealed that outsiders attacked its computer network several times in 2010, but top management did not learn of the incidents until September 2011.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.