Email Alerts
-
Phishing scams for money? Don't bet on it
Two security researchers say that most phishers fail to earn big money for their work. Article
-
Data breaches jumped in 2008, ITRC report finds
The financial-services industry is better at security than others, but it still sees an uptick in breach reports, according to a new study. News
-
Twitter tries to shore up security in wake of hack attack
As many as 33 high profile Twitter accounts were breached just days after a widespread phishing scam targeted users of the social network. Article
-
Data losses set to soar, KPMG predicts
Losses of personal and financial data are set to rise sharply in 2009 as the effects of the credit crunch begin to take effect, according to a new report. News
-
Flash, PDF are growing malware targets
Security vendor Finjan reports a growing army of cybercriminals are buying cheap toolkits to exploit the Web. Article
-
Amit Yoran on DHS, federal cybersecurity
In this podcast, Amit Yoran, former cybersecurity czar at DHS and a veteran security pro, discusses the Obama admin's security priorities and why information sharing hasn't worked. News
-
Cybersecurity expert sees PCI DSS problems ahead for retailers
It could cost millions of dollars for retailers to rip and replace outdated systems and devices still using Wired Equivalent Privacy (WEP) to secure 802.11 wireless networks, according to a security expert tracking cybersecurity in the retail industr... Interview
-
Hacked dental school server compromises 300,000
A hacker used a vulnerability scanning tool to compromise a server at the University of Florida's College of Dentistry, compromising the sensitive information of patients. Article
-
The 'appropriate' way to comply with Data Protection Act 1998
The U.K. Data Protection Act is 10 years old, but the evidence shows that many organisations are still not up to standard when it comes to the seventh data security principle: using "appropriate and adequate security measures" to protect personal dat... Tip
-
What are best practices for secure password distribution after a data breach?
After an information security data breach, it might seem like a good idea to create new user IDs and passwords for all employees in the user directory. But is there an easier way to handle the aftermath of a data breach? Find out more in this IAM exp... Ask the Expert
Security Management Strategies for the CIO