One year after Sally Beauty Supply revealed that a network breach compromised payment card data and exposed 25,000 records, the company says it is investigating new breach reports. Did it fail to eradicate the original intrusion?
Christopher Painter, the United States' top cyber diplomat, says the nation's No. 1 cybersecurity priority is getting nations to agree not to attack their respective critical infrastructures.
In this exclusive interview, Kelly King, CEO of BB&T, one of the nation's largest banks, urges other CEOs to ensure that their executive teams and boards are well-informed about cyber-risks.
The high court will decide if websites, search engines and others that amass personal information from public sources could be sued for publishing inaccurate information, even if the errors do not cause actual harm.
Emerging cybersecurity risks are now banking institutions' top concern, says the ABA's Heather Wyson-Constantine. What are institutions' contractual protections in the wake of a third-party data breach?
Security expert Mike Canavan of Kaspersky Lab North America pinpoints several critical security steps that organizations can take to help reduce the likelihood they'll become a victim of a hacking attack.
Privacy advocates in the Senate have introduced a national data breach notification bill that would allow states to keep their own laws if they provide more stringent reporting and privacy protections than offered by the federal government.
Laws rarely, if ever, keep up with technology, but even if they could, the consequences could prove more harmful than the benefits. That was evident at a House hearing that addressed default encryption of mobile devices.
Bipartisan legislation known as the USA Freedom Act, which would effectively end the National Security Agency's bulk phone records collection program, has been introduced in Congress.
After nearly 2½ months on the job, federal Chief Information Officer Tony Scott was reluctant to offer Congress a detailed assessment of the quality of agencies' information security until reviewing results of pending "CyberStat" reviews.
BitSight Technologies conducted research on breached organizations and how they were impacted by botnets. The results are eye-opening, says CTO Stephen Boyer, offering insights from this study.
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.