JPMorgan Chase in September confirmed that it was the victim of a cyber-attack that compromised customer information. This infographic provides an overview of what we know so far and what questions remain unanswered.
The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data,...
The debate between leading retail and banking associations over accountability for card fraud has heated up in recent weeks. One retail group now says claims about merchant security and fraud liability have been misstated.
Hackers launched a successful phishing attack against Fidelity National Financial employees, then used the stolen information to attempt to reroute money transfers, the title insurance and mortgage services firm warns.
In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a...
Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting...
The developer of CurrentC, a mobile wallet application, has confirmed a breach at its e-mail provider, which has resulted in the compromise of e-mail addresses for those participating in a pilot program or who requested information about it.
Payment card transactions conducted at the Cape May-Lewes Ferry in Delaware were compromised by malware for almost a year, exposing card numbers and other information.
Hackers have breached an unclassified network used by the White House. The attack reportedly lasted two weeks or more, and was only discovered after an ally alerted U.S. officials to the breach.
This white paper is based on data collected in two separate research efforts. In the first, Aite Group surveyed fraud executives at 36 large U.S. merchants from March to May 2014 to understand points of pain and planned solutions. Aite Group also interviewed card executives from payment networks and 18 of the top 40...
The increasing number of digital identities, prevalence and impact of data breaches, and loss of customer information are driving a heightened requirement for effective consumer-facing identity and access management (IAM) solutions. Many organizations with consumer portals, however, do not have effective protections...
A Massachusetts man who pleaded guilty to hacking the computer networks of law enforcement agencies across the U.S., as well as obtaining stolen payment card data, now faces a prison term.
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.