The largest federal employee union filed a class action lawsuit against the federal personnel office, its leaders and one of its contractors, arguing that negligence contributed to what government officials are calling one of the most damaging cyber thefts in U.S. history.
The federal personnel agency whose records were plundered by hackers linked to China says it...
It has been an interesting couple of weeks in the realm of cyber security, particularly for...
The federal government has for years failed to take basic steps to protect its data from hackers...
The head of the government agency that suffered two massive cyber attacks said a hacker gained access to its records with a credential used by a federal contractor. Despite calls for her ouster, the director of the Office of Personnel Management said if anyone is responsible for the breaches, it's the hackers.
Tensions between the U.S. and China are growing over its island-building in the South China Sea and over suspicions that Beijing was behind a massive hack into a federal government server that resulted in the theft of personnel and security clearance records of 14 million employees and contractors.
The St. Louis Cardinals have been the toast of their Midwestern city for generations, a source of civic pride as one of baseball's most successful and cherished franchises. Suddenly, they're an embarrassment, under federal investigation for allegedly hacking into the computer database of an opponent, the Houston Astros, whose general manager, Jeff Luhnow, is a former Cardinals executive.
It’s not often that sports are discussed in the business continuity community, especially with so many of its members working with large, multi-national firms. However, a recent high profile data breach involving two Major League Baseball teams is worth watching.
The agency that allowed hackers linked to China to steal private information about nearly every federal employee — and detailed personal histories of military and intelligence workers with security clearances — failed for years to take basic steps to secure its computer networks, officials acknowledged to Congress.
Federal law enforcement authorities are investigating whether the Cardinals illegally accessed a computer database of the Houston Astros. The aim was obtaining information from a front office headed by a former top aide who helped transform St. Louis' scouting operation to a sabermetrics-based system, a person familiar with the situation told The Associated Press.
A government data warehouse that stores information indefinitely on millions of HealthCare.gov customers is raising privacy concerns at a time when major breaches have become distressingly common. Known as MIDAS, the system is described on a federal website as the "perpetual central repository" for information collected under President Barack Obama's health care law.
Pete O'Dell, Founder of Swan Island Networks, discusses how companies can continue to operate after a data breach and why it is critical for continuity and eventual recovery from cyber attacks. This is the second in a two part series of videos.
Pete O'Dell, Founder of Swan Island Networks, discusses the potential for cyber attacks, why companies often fall victim to those attacks and what they can do to detect and prevent them. This will be the first in a two part series of videos.
An immense hack of millions of government personnel files is being treated as the work of foreign spies who could use the information to fake their way into more-secure computers and plunder U.S. secrets. Federal employees were told in a video to change all their passwords, put fraud alerts on their credit reports and watch for attempts by foreign intelligence services to exploit them.
The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress. The agency's inspector general outlined the security weaknesses a week after the IRS announced that criminals had stolen the personal information of 104,000 taxpayers from an IRS website.
Monika Stoeffl, Risk Intelligence Consultant at CR Solutions, discusses the impact social engineering has on cyber attacks as well as other risks it poses to organizations. She also discusses why it is important to be aware of social engineering as it relates to physical risks.
Authorities are still investigating a hack that led to the theft of personal information from more than 100,000 taxpayers at the Internal Revenue Service (IRS). This isn’t the first time the IRS, or any government institution, has been hacked, but each time it happens it seems to renew the discussion on the importance of cyber security.
Congress is demanding answers about how identity thieves were able to steal the personal tax information of more than 100,000 taxpayers from an IRS website. Senate Finance Committee Chairman Orrin Hatch has requested a confidential briefing by IRS officials by the end of next week.
The operator of a popular adult dating website said it's investigating a data security breach following reports that hackers stole names, email addresses and information about the sexual orientation or habits of up to 4 million members.
Thousands of patients at three northern New Jersey hospitals have been alerted that their personal information was stolen in a data breach. Officials said an employee with Medical Management LLC gave away names, Social Security numbers and birth dates of patients.
Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.
Britain's High Court has awarded actress Sadie Frost, sports star Paul Gascoigne and a group of other claimants some 1.2 million pounds ($1.8 million) in damages after their phones were hacked by journalists seeking scoops for the Mirror Group Newspapers.
Romania, known more for economic disarray than technological prowess, has become one of the leading nations in Europe in the fight against hacking. The reason: the country's own battle against Internet renegades and a legacy of computing excellence stemming from Communist dictator Nicolae Ceausescu's regime.
State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship group Greatfire.org that Chinese authorities carried out denial-of-service attacks in late March that intermittently shut down San Francisco-based Github, a U.S.-based computer-code sharing site that hosts some of Greatfire's data. Greatfire.org said it was a direct target of similar attacks earlier that month.
Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the importance of focusing on data backup, different ways organizations should back their data up and how it can and will lead to faster recovery times in the long run.
A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics. The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon.
The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.
Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.
The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several lessons learned. For example, given the critical importance of email communication, learn how Dell ensures Email Availability and communication regardless of the outage or interruption.
- Page 1