According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to organisations in 2013. The newly released Verizon Data Breach Investigation Report noted that while ...
Tags: Verizon, authentication attacks, hacktivism
Farmers Insurance Group of Companies has launched new Cyber Liability and Data Breach expense coverage program, intended to protect main street businesses in Wyoming, US. The new coverage offers $25,000 limit for indemnity, $25,000 limit ...
Tags: Farmers Insurance, Insurance Group, security risk management services
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Security analysts this week challenged South Carolina Governor Nikki Haley's defense of the state's information security practices in the wake of a data breach at the S.C. Department of Revenue that exposed the Social Security Numbers ...
Computerworld - A Danish graduate student said he was searching for research material on an IEEE FTP server last week when he stumbled upon the usernames and passwords of about 100,000 members of the professional association. In a blog ...
Tags: IEEE FTP server, web server, IEEE Site, User IDs
A typical Web application is the target of an attack at least one in three days on average,according to a report released by data security firm Imperva. The third edition of Imperva's semi-annual Web Application Attack ...
Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. The information was released on Tuesday on Pastebin by a self-proclaimed ...
Tags: Adobe, encrypted passwords, company database, Virus
Businesses are adopting cloud-based services mainly to speed up innovation and cut costs,often overlooking the security risks of this new delivery model. But security is not the only thing that is being overlooked by eager adopters of ...
Tags: analysis, security risks, date, overlook
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
A data breach at Essex County Council, which has exposed up to 400 vulnerable people to identity theft, is to be investigated by the Information Commissioner's Office (ICO). The security lapse, by a council employee, involved the names, ...
Tags: ICO, Essex County Council, investigation, computing
Over half of CIOs fail to test cloud vendors' security systems and procedures before selecting the provider, according to a survey of 250 senior IT decision-makers. The research, conducted by IT recruitment consultancy Robert Half ...
Tags: CIO, cloud vendors, security, UK
Bolton NHS Foundation Trust has selected security management firm Wave Systems' Safend Encryptor to encrypt sensitive data and manage and recover data securely. Further reading NHS Trust fined £175,000 for 'entirely avoidable' ...
Tags: Bolton NHS Foundation Trust, security management firm, data securely
Yahoo has appointed Henrique de Castro as chief operating officer (COO), just three months after appointing another Google executive, Marissa Mayer as chief executive officer (CEO). De Castro is to oversee global sales, operations, media ...
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security