Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
Did Massachusetts' first registered medical marijuana dispensary break federal or state privacy regulations by accidentally sharing patients' email addresses? Experts explain that ... well, the answer is a little hazy.
The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.
Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.
How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.
Thou shalt not reverse engineer Oracle's products. That was the stunning diktat issued by Oracle CSO Mary Ann Davidson in a blog post that some are reading as a declaration of war against the security research community.
Instead of hacking into trading platforms, prosecutors say a gang stole confidential press releases, enabling traders to illegally earn $100 million. Security experts say it's time to review the "information supply chain."
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
DHS Secretary Jeh Johnson taps Andy Ozment, assistant secretary of the Office of Cybersecurity and Communications, to undertake overall and direct charge for the National Cybersecurity and Communications Integration Center.
The APT gang known as Darkhotel quickly tapped a Hacking Team exploit for Flash, Kaspersky Lab reports. But the gang's ongoing trickery shows that organizations must do more than just patch against the latest threats.
The U.S. Department of Justice has announced charges against nine people suspected of running an international insider-trading and hacking scheme predicated on stealing confidential press releases before publication.
As a report surfaced that Chinese spies read the private emails of top Obama administration officials, the Pentagon revealed it had restored the unclassified email network used by the Joint Chiefs of Staff, brought down two weeks ago following a purported Russian breach.
A $46.7 million fraud scheme that hit Ubiquiti Networks Inc. shows the new & improved face of wire fraud - and just how easy it is for cybercriminals to fool employees into helping to pilfer their own enterprises.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.