Office of Personnel Management Chief Information Officer David DeVries says negative aspects of a Government Accountability Office report on steps OPM is taking to secure its IT paint an incomplete and not fully accurate picture of the agency's cybersecurity posture.
Spain has approved a U.S. extradition request for Russian national Stanislav Lisov, who's been charged with helping to organize and profit from a prolific banking Trojan called Neverquest. He's the latest in a long line of suspected Russian hackers to be detained while vacationing abroad.
Security expert Troy Hunt has released a massive data set of compromised passwords that's intended to help web services steer users away from picking those that have already been exposed in data breaches.
Some experts say a federal appeals court's overturning of a lower court's decision to dismiss a class action lawsuit filed against health insurer CareFirst in the wake of a cyberattack could be precedent-setting.
Vendors that provide the U.S. government with internet-connected devices would need to ensure they can be patched, don't include hard-coded passwords that can't be changed and are free of known security vulnerabilities, according to a new, bipartisan Senate bill.
FireEye has confirmed that one of its Mandiant breach investigation employee's personal laptops was breached by hackers, and corporate data dumped. The hackers say the leak is the first in a series of "Operation LeakTheAnalyst" attacks against cybersecurity researchers.
Hackers have struck Hollywood again, claiming HBO as their latest victim. So far, some unaired programming has been leaked online, as have details relating to a forthcoming "Game of Thrones" episode - but no actual episodes.
Most large organizations at least pay lip service to breach preparedness. But when it comes to proper policies, planning and practice, far too many still fall short, says Stuart Mort of the Australian telecommunications firm Optus. Here's what they are overlooking.
Penetration tests can reveal holes in an organization's security. But framing the scope of a penetration test can be challenging, and good results don't necessarily mean 100 percent security. says attorney Kay Lam-MacLeod.
To battle Russian hackers, Microsoft has moved to strip them of their malicious infrastructure. To do so, however, the technology giant isn't hunting the attackers down. Instead, it's taking them to court. Two cybersecurity attorneys rate Microsoft's efforts.
When it comes to risk, attorney Mark Doepel sees what he describes as "high cyber awareness, but low cyber literacy" among senior business leaders. But as nations adopt new breach legislation, boards and C-suites need to develop a deeper, granular understanding of risk - and fast.
Australia's mandatory data breach notification law, which goes into effect next February, brings a host of new requirements. Gordon Hughes, an attorney and data protection expert, discusses what organizations need to be aware of ahead of its implementation.
Health insurer Anthem Inc., still dealing with the aftermath of a 2015 cyberattack that impacted nearly 79 million individuals, now is coping with another - albeit smaller - breach incident. This one involves a business associate's former employee who's currently incarcerated.
Police in Greece arrested Russian national Alexander Vinnik, who was indicted by a U.S. federal grand jury for allegedly running the BTC-e bitcoin exchange and helping to launder $4 billion in cryptocurrency tied to criminal enterprises, including the hack of the Mt. Gox bitcoin exchange.