Email Alerts
-
South Carolina breach affects millions
Millions of Social Security numbers and thousands of credit and debit cards were exposed after an attacker penetrated a state agency server. News
-
Debating international cyberespionage, poor secure coding practices
Corey Schou explains why cyberespionage and corporate intelligence are linked; also, why attackers aren't to blame for insecure coding practices. Video
-
Report details insider threats, but enterprises can respond, says expert
Scott Crawford, a research director at Enterprise Management Associates, explains how some enterprises address the risk of a trusted insider turned rogue. News
-
Verizon DBIR: Identify insider threat warning signs, safeguard IP
Trusted insiders often play a role in IP theft, according to a new report. Spot the warning signs and apply the right data protection, say experts. News
-
Verizon DBIR analysis finds intellectual property theft takes years to detect
Intellectual property theft often involves collusion between attackers and malicious insiders, according to a study of 85 breaches conducted by Verizon. News
-
targeted attack
A targeted attack is one that seeks to breach the security measures of a specific individual or organization. Usually the initial attack is conducted to gain access to a computer or network and is followed by a further exploit designed to cause harm ... Definition
-
industrial espionage
Industrial espionage is the covert and sometimes illegal practice of investigating competitors, usually to gain a business advantage. Definition
-
Verizon DBIR 2012: On Web app security, basics still lacking
Expert Michael Cobb analyzes takeaways from the Verizon DBIR 2012 report regarding Web app security and the need for more basic security measures. Answer
-
PCI DSS lessons learned from Global Payments data breach
Expert Nick Lewis discusses the Global Payments data breach, focusing on lessons to be learned for PCI DSS-compliant enterprises. Answer
-
Scope of Dropbox security breach is undetermined
Dropbox spokesman says investigation is ongoing after attackers gained access to an employee account leaking user email addresses. News
Security Management Strategies for the CIO