What’s hot in enterprise IT? – Part 3
There will be an increasing crescendo of noise around the Internet and Things (IoT) and cyber security - individually and between the domains, says David Gee.
There will be an increasing crescendo of noise around the Internet and Things (IoT) and cyber security - individually and between the domains, says David Gee.
Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.
The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss the latest security vulnerabilities, explain how they can be exploited to harm consumers, and highlight research affecting consumer privacy and data security.
Corporate security executives need to meet with their legal teams to find out if the way they protect customer data will keep them out of trouble with the Federal Trade Commission if it should be compromised in a data breach.
Fallout from the Ashley Madison breach could lead to a wave of spear phishing.
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
Professional services firm, Deloitte has launched a crisis management arm in Australia to help organisations deal with disasters from data breaches to an outbreak of Ebola.
The Office of the Australian Information Commissioner (OAIC) received 4,239 privacy complaints during FY14, a 183 per cent increase on the 1,496 received in the previous financial year, according to a report.
Is the dawn of the age of ubiquitous e-payments finally here? Can we throw away our credit cards yet?
Is there a reason that data breaches have been happening at a rapid clip lately? And is there more that we, as <a href="http://www.computerworld.com/article/2487265/security0/security-manager-s-journal--cyberattacks-just-got-personal.html">security managers, should be doing to make sure that our own companies don't join the ranks of the breached</a>?
In today's bring-your-own-device and cloud services enterprise, real-world stories of data loss abound. What's really horrifying: Things seem to be getting worse.
Telstra CISO Mike Burgess says the telco has taken steps to tighten up security controls following three data breach investigations launched by Australian Privacy Commissioner Timothy Pilgrim since 2010.
Software design firm Thoughtworks is urging companies to avoid storing large amounts of unnecessary personal data, following recent data breaches at Target and Neiman Marcus in the United States.
The Identity Theft Resource Center has recorded 450 data breaches so far this year, and here are the worst that become known between July and September