There is no such thing as 100 percent security, so what does a truly successful security program look like? Mike Gentile of Auxilio describes the key elements of a formal program and how best to deploy them.
News that health insurer Anthem Inc. suffered a massive breach after hackers gained access to a corporate database illustrates yet again the healthcare sector's vulnerability. This infographic takes an updated look at the top five health data breaches.
Health insurer Anthem Inc. has suffered a massive data breach after hackers gained access to a corporate database reportedly containing personal information on as many as 80 million of its current and former U.S. customers and employees.
Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
A new report claims that Russian hackers, using spear-phishing attacks, breached the Sony Pictures Entertainment network by November 2014. But it's not clear whether they were responsible for the "G.O.P." attacks attributed by the FBI to North Korea.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Target Corp. has replaced its "interim" CIO, who was named to the post last year following its massive 2013 data breach that compromised 40 million credit card numbers and exposed personal details on 70 million customers.
In addition to dealing with sophisticated threats to SCADA and IC Systems, utilities have to address specific regulatory requirements like NERC Critical Infrastructure Protection (CIP) Cybersecurity Standards.
Download this whitepaper to:
read a summary of the NERC CIP requirements;
identify the key security...
When shopping in-store, customers want and expect connectivity - plus they are inclined to buy more when they have a personalized shopping experience. However the cyber security responsibility falls directly on the retailer to protect their customers and the company's reputation from the next data breach.
As a 20+ year leader in check fraud detection and prevention, Fiserv has the unique opportunity to observe market trends related to RDC and check fraud. During this webinar you will hear from Mike Urban with Fiserv Financial Crime Risk Management, who will discuss these trends and the specific capabilities banks need...
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.