Banks need to prepare for many more massive cyberattacks along the lines of the sophisticated campaign that hit JPMorgan Chase and other financial services organizations, says Javelin Strategy & Research's Al Pascual, who offers risk management insights.
Cable TV provider Cox Communications will pay a fine and implement a seven-year monitoring program to settle an FCC complaint after suffering a 2014 breach at the hands of a Lizard Squad hacker. Find out the size of the FCC's latest breach-related penalty.
As organizations move to highly mobilized workforces, IT departments are challenged with evolving mobile security policies, moving from programs that addressed device and email security, to addressing a wide range of mobile applications, both on-premise and cloud-based. This fundamental shift requires an understanding...
With enterprise users having nearly ubiquitous access to corporate email and attachments on mobile devices, they are becoming an increasingly attractive access point for attackers. It only takes a few minutes to penetrate the standard protections on most mobile devices, and doing so can expose both sensitive corporate...
Many organizations start with mobile email. However, once you finish mobilizing Exchange, your users will be asking for Lync, SharePoint and more. While you may be mobilizing Microsoft apps today, consider security needs, device diversity, and user demand for other business apps to ensure your strategy is scalable and...
Hartford Hospital and its business associate, EMC Corp., have agreed to pay a fine as part of a health data breach settlement with Connecticut's attorney general. Learn about the size of the financial penalty and other settlement details.
The group of hackers who recently claimed to have hacked the CIA director's personal email account now says it has breached an FBI information-sharing portal. So far, the group has released contact information for about 2,400 law enforcement users.
Distributed-denial-of-service attacks on banks are more powerful than ever, but we hear less about them than we did three years ago. How have attackers changed their tactics, and why should we be even more concerned about their strikes?
Buoyed by massive illicit profits, cybercriminals have continued to refine their ransomware attacks, including updating their crypto techniques to foil decryption tools, encrypting file names and threatening to leak stolen secrets.
In a video interview, Bob Carr of Heartland Payment Systems offers a frank assessment of missteps in the wake of the processor's landmark 2008 data breach, and he calls for widespread use of end-to-end encryption.
To avoid having their organizations exploited by teenage hackers, boards of directors worldwide need to get serious about security. Here are five lessons to be learned from the latest TalkTalk data breach.
The FFIEC has issued an alert calling on financial institutions to take specific risk mitigation steps in light of an increase in the frequency and severity of cyberattacks involving extortion. Fraud experts applaud the move while offering additional recommendations.
The quantity and duration of distributed denial-of-service attacks continue to increase. The latest attacks are being launched via MySQL servers infected with Chikdos malware, as well as compromised Internet-connected CCTV systems, researchers say.