North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
The FBI says it has traced the hack attack against Sony Pictures Entertainment to North Korea, and President Obama says that the United States will respond proportionately to the cyber-attack.
The Sony Pictures Entertainment hack, and the company's decision to yank the release of a film in the wake of hackers' threats, has provoked intense reactions. Read the comments and join the conversation.
The White House says that it's treating the hack attack against Sony Pictures Entertainment as a "national security matter." But it says it's too early in its investigation to definitively attribute the attacks to any particular group or nation.
The National Credit Union Administration will review its data security policies and procedures after sensitive customer data was lost as part of an audit. One fraud expert calls for the FFIEC to expand security oversight of all its member agencies.
Without ceremony, President Obama has signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the law that governs federal government IT security.
Many security experts say Sony Pictures Entertainment's decision to cancel the release of the film "The Interview" following a "terror" threat made by hackers against movie theaters and theatergoers sets a dangerous precedent.
Don't take at face value the report that the U.S. government believes that North Korea hacked Sony Pictures Entertainment, numerous information security experts say, warning that hacktivists, insiders or other nations could be the culprits.
Researchers are alarmed about the increasing sophistication of crimeware-as-a-service, an underground business model that pushes adaptable malware from a botnet. How can banking institutions defend their accounts?
Today's customers commonly demand access from any device to any app, anywhere, anytime. But managing high-volume customer identities and supporting digital interactions across web, mobile, and API-based environments raise new identity and access management challenges and magnify any gaps or inefficiencies in security....
Year after year, cyber threats continue to increase in both sophistication and frequency. These threats often lead to high-profile losses, rampant media commentary and end user uneasiness.
Download this eBook to understand:
Why breaches are occurring;
How to protect your organization from hackers with...
The cloud is changing the way businesses approach enterprise software as it provides an option to outsource the infrastructure and underlying maintenance that accompanies deployments. If organizations can fast forward beyond the process of procuring hardware and facilities, installing and configuring software or...
One day after hackers made a "terror" threat against movie theaters planning to show the upcoming film "The Interview," Sony Pictures Entertainment canceled its release.
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.