Today, many vendors are developing sandboxes to help stem the rising tide of advanced threats. Many vendors claim they can a broad range of advanced attacks. But do they?
Not all sandboxes... Read more »
In the wake of the Target, Neiman Marcus and other retail breaches, banking/security leaders clearly feel abused and frustrated - and they want to see changes in how merchants conduct and process... Read more »
Did you ever count the number of vendors your organization uses to run your business operations? Even mid-sized companies easily exceed one hundred third-party vendors, including technology vendors, electricity, hosting, facilities, payment,... Read more »
The explosion in POS malware attacks against U.S. merchants highlights the need for retailers to take bolder security steps. Troy Leach of the PCI Council and Karl Sigler of Trustwave outline key... Read more »
Canada is considering adopting tougher data security and cybercrime legislation that could serve as a model for other nations, says Claudiu Popa, an information security expert who'll be a panelist at the... Read more »
Digital privacy isn't a privilege or a policy. It's a fundamental human right, says Rajesh Vellakkat, partner in the law firm of Fox Mandal & Associates. What are today's top legal challenges... Read more »
In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst. Read more »
Malware Used in Compromise of Third-Party VendorGoodwill Industries International says in an update about a breach affecting about 330 of its stores that approximately 868,000 payment cards were exposed. It also identifies... Read more »
Security Intelligence Firm Serves Multiple MarketsPrivate equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed. Read more »
How a Little Privacy Can Take a Security Program FarYou need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers... Read more »