Email Alerts
-
PCI encryption requirements driving widespread adoption, survey finds
Encryption has become generally accepted in the industry, said Larry Ponemon, founder of the Ponemon Institute LLC. Article
-
privilege escalation attack
A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. Definition
-
Privacy advocate explains why people should care about privacy
An all out assult on privacy is taking place and some people are failing to see the problem, said Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario. News
-
Midmarket financial firms grapple with internal, external security threats
Midmarket financial firms, struck hard by global economic concerns, are facing a challenging threat environment while trying to trim operational costs – a process that is putting further strain on IT security professionals. News
-
University data breach stats show more data losses
With data losses mounting, universities are paying a big price for stolen information, according to a new report. A more proactive approach to security can mitigate the problem. Article
-
bot worm
A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... Definition
-
Black Hat: Targeted network security attacks beating forensics efforts
Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings. Article
-
Verizon data breach report 2010: Insider breaches on the rise
The company's highly anticipated report, which this year combines Secret Service data to analyze nearly 900 individual data breach cases, shows an increase in breaches by insiders, while overall breaches may be on the decline due to market saturation... Article
-
Mass. hospital deals with lost backup data files
Third-party firm hired by the hospital to destroy its backup data can't confirm it carried out its services, leaving 800,000 people at risk to identity theft. Article
-
Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain
Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving encryption, which replaces the 16-digit cre... Interview
Security Management Strategies for the CIO