Oman is dealing with the challenge of increasing cyber incidents and a rise in cybercrime and so on. How does Oman's CERT address this surge? OCERT's head, Al Salehi, shares his 2015 cybersecurity agenda.
A federal judge has dismissed a class action lawsuit filed against eBay in the wake of a 2014 data breach that exposed encrypted passwords and personal information for 145 million users.
One year after Sally Beauty Supply revealed that a network breach compromised payment card data and exposed 25,000 records, the company says it is investigating new breach reports. Did it fail to eradicate the original intrusion?
Is there a governance structure that can protect your network and customer data against future attacks? Oman Insurance's Bhatia discusses how security and business alignment is critical to data security.
Partners HealthCare System is the latest healthcare organizations to suffer a data breach following a phishing attack. But why did Partners wait five months to issue a breach notification, when HIPAA requires notifications within 60 days?
97% of Financial Services respondents report being somewhat or more vulnerable to insider threats. This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. financial services enterprises in the Fall of 2014. U.S. results are compared, where applicable, to findings...
Healthcare data (Personal Health Information [PHI] and other personal data held by healthcare organizations) has become one of the most desirable commodities for sale on "black" Internet sites, and for good reason. Healthcare records typically contain enough detail to not only apply for credit cards or loans, but can...
In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That's no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and...
In the past few years, Vormetric has been busy showing the world that it's no longer just your father's file and database encryption vendor. Since the launch of its Vormetric Data Security platform strategy in early 2014, the company has been hard at work extending the platform's capabilities with new features and...
In the wake of a breach, most organizations struggle with a number of concerns related to response, mitigation and notification. While immediate and full disclosure of a breach, in theory, sounds like the most practical advice, it's not always the best move for every organization. The nature of the breach, whether the...
Partners HealthCare System announced that it is the latest healthcare organization hit by a data breach attributed to a phishing attack. The records of an estimated 3,300 individuals may have been compromised in the incident.
Gulf Air in the Middle East has become one of the region's early adopters of the cloud. What are the challenges for security team to secure data in the cloud? Gulf Air's Jassim Haji shares insight.
The latest victim of malware attacks against point-of-sale system vendor NEXTEP is foodservice management company Compass Group, which says payment card data for up to 70,000 users of self-service kiosks was exposed.
Companies are increasingly reliant on storing sensitive data in cloud storage, which could be vulnerable to security threats and violate compliance requirements. At the same time, data breaches continue to grow more prevalent and costly. The Vormetric Cloud Encryption Gateway is a scalable solution that provides...
With big data analytics growing in popularity, many organizations have turned to MongoDB, which optimizes performance. Along with traditional sources of data, such as transactional systems and data warehouses, enterprises can now collect and leverage data from logs, social media interactions, sensors, and other...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.