In another push for national breach notification legislation, Attorney General Eric Holder is calling on Congress to create a standard in the wake of breaches at Target Corp. and Neiman Marcus.
Neiman Marcus has revised downward its estimate of the number of payment cards compromised in its breach last year. Company CEO Karen Katz offers new details.
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks, outlines steps merchants, banks and others should take to secure their networks.
Because of concerns of possible National Security Agency meddling with its cryptographic standards, NIST has issued a draft report proposing revisions in how it develops cryptographic standards.
Distributed generation and plug-in motor vehicles are among the emerging security challenges to the smart grid. In an RSA 2014 preview, Gib Sorebo of Leidos discusses the threats to utilities and consumers.
Many security incidents that affect the nation's critical infrastructure go unnoticed due to a lack of sufficient detection or logging capabilities, according to a new report, which calls for enhanced monitoring and reporting of incidents.
The Pentagon continues to work to fix network vulnerabilities nearly a half-year after attackers - reportedly from Iran - breached the Navy Marine Corps Intranet.
Organizations need to be wary when using commercial databases for potential employees' background checks, says Les Rosen of Employment Screening Resources, detailing the top screening trends for 2014.
You'd think that preventing damage caused by cyber-attacks would be incentive enough to get organizations to adopt cybersecurity best practices. But the government is working with industry to develop incentives to encourage adoption.
Despite their differences on certain issues, the Financial Services Roundtable and the Retail Industry Leaders Association have joined forces in an effort to prevent breaches by enhancing cybersecurity and threat intelligence sharing.
2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
Merrill Halpern of the United Nations Federal Credit Union, a pioneer in the use of chip cards, says high-profile retail breaches reinforce the long-term value of EMV for various forms of payment within the U.S.
Now that the cybersecurity framework has been released, security experts are pondering whether the voluntary approach to following the guidance might eventually need to be replaced by some sort of mandate.
Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software. This eBook helps you calculate the true cost of protecting your business infrastructure,...
Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving tricks by cybercriminals?
Download this white paper to have access to a wealth of IT security intelligence, including:
A concise overview of malware and tactics;
Common...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.