Email Alerts
-
PCI DSS 1.2 clarifies wireless, antivirus use
Version 1.2 of PCI DSS, due out in October, requires 802.1x for wireless protection and antivirus for all operating systems, according to a summary of the changes issued Tuesday. Article
-
TJX hacking ring charged in federal indictment
An indictment handed down Tuesday alleges 11 people schemed to steal millions of credit and debit card numbers from TJX and other retailers. Article
-
Web 2.0 and e-discovery: Risks and countermeasures
Enterprise employees often love Web 2.0 services like wikis and social networking services, but the data employees may create with or provide to those services can put an enterprise at risk, especially when litigation calls for electronic discovery o... Tip
-
Security data lapses hamper researchers
Accurate information on attacks and data breaches could boost research and drive innovation. Column
-
Data breaches caused by employee errors, process failures
A study released by Verizon Business investigative unit found that employee errors are a contributing factor in nearly all data breaches. Article
-
Data breach laws have no effect on prevention, researchers say
Researchers at Carnegie Mellon University say there is no evidence that breach notification laws prevent identity theft, but they may have other benefits. Article
-
Walter Reed admits breach of patient information
An employee could have downloaded peer-to-peer (P2P) network software onto a hospital computer putting the data at risk. Article
-
Stolen data ending up in Google cache, say researchers
Unprotected hacker drop sites are being crawled by search engines. Passwords, Social Security numbers and sensitive business information can be uncovered with a simple search. Article
-
Societe Generale bolsters internal controls, discovers second insider
Trader Jerome Kerviel conducted more than $7 billion in fraudulent trades with the help of an assistant, according to an investigation conducted by banking giant Societe Generale Article
-
Security breach management: Planning and preparation
All organizations face the risk of an information security breach. While it can be a gut-wrenching ordeal, learning how to manage a breach can make it much easier to contain the damage. In this tip, contributor Khalid Kark unveils several key priorit... Tip
Security Management Strategies for the CIO