Is the Information Assurance practice helping Qatar's security leaders manage risks and security better? QCERT's Ashraf Ali Ismael shares insights on how security leaders are embracing the IA concept.
What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
Do CISOs need mentoring? Daniel Lohrmann shares insights on the importance of mentoring CISOs to enable them to spot growth opportunities and also to build up their interpersonal skills.
Gulf Air in the Middle East has become one of the region's early adopters of the cloud. What are the challenges for security team to secure data in the cloud? Gulf Air's Jassim Haji shares insight.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
A combination of technical and managerial problems set the stage for hackers to breach a Department of Energy database last summer, a new report shows. The incident cost the department millions of dollars.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
Three recent identity theft incidents highlight the need for healthcare organizations to stay vigilant in preventing fraud involving insiders. Security experts offer advice.
A breach at a Texas credit union shows how fraudsters target financial institution employees to gain access to sensitive information. Why are institutions proving to be soft spots for compromise?
As banking institutions await a new wave of DDoS attacks, one security vendor says it foresaw one rare -but effective - element of these attacks as far back as 2006. What can banks expect to see next?
What exactly is continuous monitoring - and why is it so hard for organizations to get it right?
It is one of the most discussed and least understood concepts in enterprise risk management today. Fundamentally, continuous monitoring is about deploying systems to examine all of the transactions and data processed...
In healthcare, financial services and other sectors, information breaches are an epidemic. More than 400 major healthcare breaches have been reported since late 2009. And headline-grabbing breaches in the financial services sector, such as the Sony and Global Payments incidents, illustrate why preventing breaches -...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.