Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public...
The White House is setting up a new agency designed to coordinate cyber threat intelligence that...
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.
The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.
Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers. Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement.
A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking. Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.
President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats. Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns.
The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge to ban his extradition to the United States. U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.
In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act. The act would also make it a crime to sell customers’ identities overseas.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.
Lori Cunningham, Lead IT Service Management Specialist for Aetna, will present "From Checking-the-Box to Truly Resilient: Case Studies in Disaster Recovery." She will focus on public and private sector case studies that show why having a strong disaster recovery program is important for any organization.
A massive data breach at Sony Pictures Entertainment, which experts believe was targeted by North Korea as retaliation for a film depicting the assassination of its leader Kim Jong Un, has led to an international incident that has gained the attention of business continuity professionals.
South Korea's monopoly nuclear power company said it began drills against possible cyberattacks after online threats of attack against its plants. State-owned Korea Hydro & Nuclear Power Co. said the two-day drills are meant to prepare workers in the event of hacking attacks aimed at disabling the plants' controlling systems.
The unprecedented hack of Sony Pictures which a U.S. official says is linked to North Korea may be the most damaging cyberattack ever inflicted on an American business. The fallout from the hack that exposed a trove of sensitive documents, and this week escalated to threats of terrorism, forced Sony to cancel release of the North Korean spoof movie "The Interview."
Criminals stole personal information from tens of millions of Americans in data breaches this past year. Of those affected, one in three may become victims of identity theft. Americans are mostly at the mercy of companies to keep their sensitive details safe. But there are steps businesses and individuals can take to protect themselves against the financial, legal and emotional impact of identity theft — and most of them are free.
Researchers say they have a wealth of clues — but no clear answers — as to the identity of those behind a series of newly discovered cyberattacks targeting Russian and Eastern European embassies, oil companies and military officers. The malware — nicknamed "Inception" — has been attacking mainly Russian or Eastern European targets in the fields of diplomacy, energy and finance.
North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures, which is producing an upcoming film that depicts an assassination plot against Pyongyang's supreme leader. Some cybersecurity experts say they've found striking similarities between the code used in the hack of Sony Pictures Entertainment and attacks blamed on North Korea that targeted South Korean companies and government agencies last year.
Fred Bowne, Managing Principal at Aristata and and Director of the Resilient Technology Collaborative, discusses the goals of the RTC and how they hope to help business continuity professionals solve shared tech challenges from across the industry.
Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online. Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un.
Tim Mathews, Executive Director of Enterprise Resiliency for Educational Testing Service, discusses the impact the cloud could have on your BC/DR program, the risks it brings and why having an exit strategy in case data needs to be moved again is critical.
The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week. Sony's corporate email and other internal systems were knocked offline, according to reports.
Computer hackers have attacked the website of Poland's electoral commission, which is still unable to publish full returns from local elections because of an unrelated computer glitch, officials said Wednesday. The State Electoral Commission said while the website hacking incident didn't add further difficulties to the vote counting process, it ordered its officials to change their passwords.
Hybrid clouds are making it possible for enterprises to take advantage of the mobility and convenience of managing some resources via the public cloud without sacrificing the security of managing critical applications and sensitive data within an on-premise private cloud. If you’re considering joining the ranks of hybrid cloud adopters, take the time to ask yourself some key questions to decide if hybrid cloud is right for you.
The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack. A senior department official said "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network.
Jeff Reinke and Bridget Bergin of Manufacturing.net discuss cyber attacks and how an overwhelming number of those attacks start internally. Topics covered include fog computing, security within a network’s infrastructure, and the open source nature of IoT.
Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the National Oceanic and Atmospheric Agency's budget.
- Page 1