A new report from California's attorney general says failure to implement 20 critical security controls constitutes a lack of "reasonable security." So, could failure to adopt controls pose a legal threat to organizations? Perhaps, under certain circumstances.
The Internal Revenue Service, for the second time since August, has revised upward the number of accounts victimized in its Get Transcript breach, with the tax agency saying the personal information from as many as 724,000 taxpayers' accounts may have been stolen.
It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
When is a breach not a breach? When you can prove that sensitive data has not been accessed even off a lost or stolen device. And the way
to ensure that is through absolute data and device security.
Download this white paper to explore
How to prepare for a breach before it happens;
Current shortcomings...
HTTPS isn't what it used to be. In this whitepaper, you'll learn SSL/TLS best practices for securing modern websites, such as HSTS header support, use of SHA-2, and enabling forward secrecy. But, modern SSL doesn't just better secure your site; it's designed for performance, too.
You'll also discover some common...
Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks. These attacks simply cannot be addressed by traditional on-premise solutions....
Cybercriminals spend as much time trying to break into your enterprise as you do growing your business. Attackers collaborate their skills and execute well-structured strikes that take advantage of the many points of entry into your systems. To fight back you need your own unified plan of attack so that you can better...
In an in-depth interview, CIO Ed Ricks of Beaufort Memorial Hospital in South Carolina offers insights on how the community hospital, with limited resources, is tackling breach prevention and detection. He'll be a featured speaker at the HIMSS 2016 Conference.
Although we have made progress in the use of analytics and intelligence, the latest
SANS Security Analytics survey shows 26 percent of respondents feel they still can't
understand and baseline normal behavior in their IT environments, with a majority citing
a lack of people and dedicated resources as an...
Every year, organizations spend millions of hours and countless sums of money trying to reverse the
damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond
intellectual property loss and huge fines levied for non-compliance. Productivity, long-term profitability, and brand...
Advanced Persistent Threats (APTs) are a growing concern in the security industry. There is no single attack vector used by APTs, no single activity pattern, and thus no easy way for an organization to protect itself from an APT.
While no two APTs are the same, most follow a common lifecycle in which reconnaissance...
With word of her retirement, Donna Seymour received criticism and praise for her work in response to the hack of the agency's computers that exposed the personal information of 21.5 million individuals.
This third-annual Cyberthreat Defense Report pursues to inform the IT security
community how their peers globally
are currently defending against threats and
the changes they expect to make going forward.
Based on a rigorous survey of IT security decision
makers and practitioners - across not only North
America...
This year more companies have a baseline data breach response plan in place. Since 2013, the percentage of organizations that reported having a data breach response plan
increased from 61 percent to 81 percent. However, data breach response plans are often missing crucial steps.
While it is encouraging to...
In 2015 alone, 84 million new pieces of malware were created. How can organizations hope to keep pace with the new strains and tactics? Through advanced endpoint protection, says John Peterson of Comodo.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.