The U.S. Navy is set to begin notifying more than 130,000 current and former sailors that their personal information was "accessed by unknown individuals" after a Hewlett Packard Enterprise Services employee lost a laptop.
IBM will pay an unspecified amount to the Australian government for the vendor's role in the technical problems related to the recent online census, which dented public confidence in large-scale IT projects.
A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
Organizations in all sectors need to be aware of newly emerging insider threats, including those tied to the dark web, Michael Theis of Carnegie Mellon's CERT Insider Threat Center explains in this video interview.
Cybercriminals broke into the payment card processing system used by the Madison Square Garden Co., owner of Radio City Music Hall and other iconic entertainment venues, harvesting payment card details for nearly a year.
European banks have seen a new wave of ATM jackpotting attacks, where machines are commanded by malware to spit cash into the waiting hands of criminals, according to a new report. But why is this report being cautiously received?
In September, the annual G20 summit - the gathering of leaders from 20 major global economies- was held in China. NSFOCUS was selected to provide security protection. Guy Rosefelt discusses that mission and its unique challenges.
Security vendor Symantec plans to integrate identity theft protection services into its product offerings with its just-announced $2.3 billion pending acquisition of LifeLock, which has 4.4 million customers.
The latest ISMG Security Report leads with a look at how to protect patient data should President-elect Donald Trump and the Republican-led Congress follow through with their promise to dismantle Obamacare. Also featured is a discussion of whether IoT security should be regulated.
So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
Three Mobile, one of the largest U.K. mobile providers, saw more than 132,000 accounts breached in a scam in which fraudsters ordered new devices for customers and then tried to intercept the deliveries.
Vulnerable firmware has been highlighted again in a range of low-cost Android phones, raising concerns over their security. This latest incident comes 11 months after security analysts first raised flags.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.