Schnucks Markets, a 100-store grocery chain across the Midwest, said on Monday that roughly 2.4 million payment cards used at 79 of its 100 stores may have been compromised as a result of a previously disclosed cyber attack.
A new report from McAfee outlines the growing risks in the sales and commerce industry, due in part to the mix of legacy and newer Point of Sale (POS) systems, in addition to secondary market hardware.
Microsoft has finally opened up and disclosed how frequently U.S. and foreign governments demand user data, and how often it hands the information over. While it appears to be frequently, not a lot of personal data is being disclosed, according to the report.
Ryan Naraine talks to Christopher Soghoian about the latest iMessage encryption brouhaha, the indifference of the telephone companies towards security and the controversial practice of buying and selling software exploits.
Just like travel, incident response is a business responsibility. You need to understand and practice your plans, your responsibilities, your points of engagement and the tools you have at your disposal, to meet your goals in the most effective way.
Oversights are not often made for lack of knowledge; it’s just that there are numerous “invisible” or virtual elements coming together behind the scenes of your service provider’s infrastructure and managed support, but if each party’s scope of responsibility is not rooted out and clearly defined, hidden details can endanger your business.
Barack Obama played his cards right with the recent roll-out of the Executive Order for Improving Critical Infrastructure Cybersecurity. He succeeded where the Congress has thus far failed, and the biggest reason for that success is privacy.
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?