We’ve covered a great deal of the major data breaches experienced by enterprises over the last decade or so—Sony, the South Korean government, Nvidia, Honda—but there’s nothing quite like looking at them together, visualized.
Browsing: Breaches
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses.
In order to make sure a phishing campaign works, the victim has to believe an email is legitimate. It’s no surprise that the Apple security breach is the latest event to be taken advantage of.
About 50 institutions — including banks like JPMorgan Chase (JPM, Fortune 500) and Bank of America (BAC, Fortune 500) — will participate in the exercise, called “Quantum Dawn 2.”
If there are any lingering doubts that mobile devices have profoundly transformed today’s business, one study finds that using smart devices for productivity is “now the standard.”
After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked.
Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings.
Members of a House subcommittee on Thursday heard an essentially unanimous call from a panel of witnesses for a national data-breach notification standard to replace the wide-ranging laws currently on the books in 48 states.
My last blog argued that the technical reliance on anti-malware must end if we are to meet the challenges of contemporary cyber threats to both consumers and enterprises.
The benefits of adopting cloud technologies have been widely reported and are commonly understood. However, cloud brings with it many questions and concerns about jurisdictional and regulatory control over the privacy and protection of sensitive data.