Web hosting provider DreamHost has issued its first ever transparency report to show off how frequently the company did not comply with government requests.
Hi, what are you looking for?
Web hosting provider DreamHost has issued its first ever transparency report to show off how frequently the company did not comply with government requests.
Health insurance giant Anthem was criticized last week after reports emerged that it had declined a security audit from the Office of Personnel Management's...
While a growing number of financial services organizations are moving their data and applications to the cloud, most of them do not have a...
Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such...
Capabilities of "Equation Group" Surpass Anything Known in Terms of Complexity and Sophistication of Cyber Attack Techniques
A Chinese attack group infected Forbes.com back in November in a watering hole attack targeting visitors working in the financial services and defense industries,...
Threat information-sharing is a phrase that gets thrown often, but there isn't much agreement on how organizations should be working together or the methods...
It didn't take long for information security professionals to take to Twitter, blogs, and social media to blast the latest White House proposals for...
In plain terms, 2014 sucked for information security. Mega-breaches at retailers, insider theft at banks, and human error at universities and hospitals. The sliver...
Survey Examines Impact Data Breaches at Target and other Organizations Have had on IT Budgets and Security Practices. Organizations are increasing investment in IT...
The gulf between reality and perception is widening, according to Cisco’s annual survey of CISOs and security executives. Nearly 75 percent of CISOs in...
President Obama has outlined a series of data security and privacy proposals in the latest sign the White House and Congress are gearing up...
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
The prevailing narrative for the recent devastating cyber-attack against entertainment giant Sony sounds like a script: a small country angry about a movie about...
With Black Friday and Cyber Monday just a few short days away and the memory of the Target breach still fresh, retailers are under...
A group of attackers have targeted business travelers in the Asia-Pacific region with a sophisticated cyber-espionage campaign, Kaspersky Lab said today.
For some cyber-criminals, faking a data breach is all it takes to inflict real economic and reputation damage on a company without having to...
ATLANTA – 2014 ICS Cyber Security Conference - Ultra Electronics, 3eTI, a maker of cyber-technology solutions designed to secure critical infrastructure and improve operational...
Researchers have disclosed a design flaw (CVE-2014-3566) in SSL 3.0 which lets attackers extract session cookies and other secrets from encrypted online communications.