Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they've been compromised, says Paul Royal, associate director of the Georgia Tech Information Security Center.
UK-based insurance firm Staysure has notified more than 93,000 customers that their personal information, including encrypted payment card details, were compromised following a cyber-attack against its systems in October 2013.
Intel is changing the name of its McAfee line of security products to Intel Security. The name change follows the badmouthing of McAfee products by founder John McAfee, who sold his company to Intel in 2011.
JPMorgan Chase will pay more than $2 billion in fines for violations of the Bank Secrecy Act tied to failure to report suspicious activity related to Bernie Madoff's decades-long, multi-billion dollar Ponzi scheme.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.
Three Democratic senators are calling for a hearing to examine whether stronger cybersecurity standards are needed to protect consumer data following a massive breach at Target that affected as many as 40 million debit and credit cards.
American and Russian negotiators met last month to discuss cybersecurity issues, including the use of the Nuclear Risk Reduction Centers to improve communications between the two nations to mitigate malicious cyber-activity.
A federal district judge in New York upheld the constitutionality of the National Security Agency's program to collect metadata of phone calls made by Americans. The ruling conflicts with another federal judge's recent decision.
The potential of governments messing with commercial IT security products - think China and the NSA - means organizations need to improve lines of communications to assure the integrity of the IT wares they acquire. ISF's Steve Durbin discusses mitigating supply-chain risk.