A U.K. House of Lords subcommittee has criticized the recent EU Court of Justice "right to be forgotten" ruling as being "unworkable, unreasonable and wrong in principle." The U.K. government says it plans to fight the measure.
A new handbook from the National Association of Corporate Directors, titled Cyber-Risk Oversight, offers five principles to guide boards of directors in helping their organizations address IT security threats.
Warning from the U.K. Information Commissioner's Office: Businesses that work with big data must ensure they still comply with EU data protection regulations, especially when it comes to keeping personal information private.
A low-tech campaign combines phishing, small-footprint attack code and Android malware to topple banks' security defenses in Switzerland and three other nations. Will the campaign extend to U.S., U.K., and beyond?
A new impersonation scheme is taking aim at business executives to perpetuate ACH and wire fraud, says Bank of the West's David Pollino, who explains steps institutions should take now to protect their customers.
Google and Microsoft met with European regulators in Brussels July 24 to discuss their compliance with the "right to be forgotten" ruling and whether it should apply to all of their search engine sites - and not just those in Europe.
The website of the European Central Bank has been breached and contact information for event registrants stolen. The breach only came to light when a hacker attempted to obtain a ransom to return stolen data to the bank.
Leading this week's industry news roundup, Quantum Corp. is integrating its StorNext scale-out storage with the FireEye network forensics platform, while CARD.com is partnering with IDology to help prevent card fraud.
Sources say a yet-to-be-confirmed breach of payment card data linked to transactions at Goodwill Industries could be linked to a point-of-sale vulnerability that may have affected other numerous merchants.
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
Big data has been the recent buzz in security circles, but what are organizations missing by overlooking the power of "small data?" Verizon's Jay Jacobs discusses how to get the most from data analytics.