Data breach News
February 14, 2018
The Equifax breach compromised even more consumer data, including tax identification numbers, than originally reported. But the credit rating agency didn't disclose the update.
February 09, 2018
News roundup: Apple's highly protected iBoot source code was leaked online. Plus, the U.S. Consumer Financial Protection Bureau stops its Equifax breach investigation, and more.
January 05, 2018
News roundup: A DHS data breach exposed PII of 250,000 federal employees, as well as investigative data from 2002 to 2014. Plus, a new bill aims to nix paperless voting, and more.
December 29, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors offer their cybersecurity predictions for 2018, including forecasts for cryptojacking, DDoS attacks and other threats.
Data breach Get Started
Bring yourself up to speed with our introductory content
Learn about important cybersecurity techniques and technologies that serve as the foundation of both day-to-day security operations and incident response. Continue Reading
Signing code ensures that every change is official and approved. This helps to prevent errors and security breaches. Write a PowerShell self-signed certificate for code testing. Continue Reading
Omar F. Khawaja, CISO at Highmark Health, has five areas of focus on his cybersecurity roadmap, and technology is not at the top of the list. Instead, he is prioritizing organizational change management and building an effective decision-making framework for the security leaders of the national healthcare provider and insurer.
While Khawaja's cybersecurity roadmap may sound ambitious, his focus on risk management and team decision-making to align the security program with the healthcare organization's business strategy is far from unique. Studies show that executives increasingly recognize that a cyberattack could cripple their operations and mean millions in lost business and reputational damage as well as in cleanup costs.
"CISOs are now charged with defending this digital infrastructure, and that includes software everywhere and data as a resource, and that's a massive change at a time when the attack surface keeps expanding," says Jeff Pollard, an analyst at Forrester Research.
In this issue of Information Security magazine, security professionals detail the process of developing effective one-year plans. Why do companies struggle to strengthen their cybersecurity roadmap? We look at effective planning, what could go wrong and how to get support for your strategy.Continue Reading
Evaluate Data breach Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Compliance with the European Union's General Data Protection Regulation isn't optional. Noncompliance could be costly and possibly disastrous. Find out what you need to know. Continue Reading
It's not about the quantity of software releases, but about the quality, according to industry experts. Look for test automation, a big role for cloud and another telling trend. Continue Reading
Data center operations have changed, making firewalls potentially weaker and breaches more likely. Next-gen firewalls, though, are better adapted to today’s DC environment. Continue Reading
Manage Data breach
Learn to apply best practices and optimize your operations.
Any organization that uses cloud services can learn something from the 2016 Uber data breach. Expert Ed Moyle explains the main takeaways from the massive breach. Continue Reading
It takes a variety of tactics, including network segmenting and monitoring, to safeguard the network. Learn the latest defenses to keep your network safe. Continue Reading
Some large U.S. companies have been working behind the scenes on GDPR requirements for more than a year, but there's strong evidence that many have not been as diligent. Continue Reading
Problem Solve Data breach Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises using the cloud should be particularly careful to avoid an insider data breach. Expert Frank Siemons explains why it's important to stop insider threats in the cloud. Continue Reading
As cyberattackers continue to find new ways to hold data for ransom, the onus is on healthcare organizations to prevent ransomware before it can infect users' machines. Continue Reading
Data breach litigation can be highly detrimental to an organization that just suffered a major security incident. Find out what kinds of legal action enterprises could face in the event of a data breach. Continue Reading