Since Monday, more than 1.15 million victims of the country's largest-ever leak of private financial information have cancelled their credit cards permanently or requested new ones, according to the Financial Supervisory Service (FSS).
Organizations can draw lessons from the Target data breach by considering various attack scenarios such as card readers which have been tampered with, POS systems infected with malware, and insider threats.
Housed in one of Switzerland's numerous deserted Cold War-era army barracks, the high-tech Deltalis data center is hidden behind four-ton steel doors built to withstand a nuclear attack -- plus biometric scanners and an armed guard.
Much can be learned from airport security that can applied to dealing with insider threats. As a starting point, let’s compare two approaches to airport security – the US approach and the Israeli approach.
It is difficult to argue against the fact that in today's world organizations need to deploy at least some level of activity monitoring to protect themselves against the insider threat, other cyber risks and productivity loss.