The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states. Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.
For many organizations, the project-based accounting approach, in which departments “buy” ...
Patented seed allegedly stolen from U.S. seed corn companies ...
An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.
Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years. Deliberate hacking was responsible for 40 percent of the 5,000 incidents.
Authorities say a 30-year old Russian man recently arrested on bank fraud and other charges was also found to have hacked into computers at restaurants in Western Washington, hundreds of other retail businesses and even the Phoenix Zoo.
Steve Ross, Executive Principal for Riskmasters Inc., discusses the importance of being prepared for interruptions caused by cyber attacks and why business continuity professionals should put more effort into planning for such attacks
German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage. The United States and other governments complain China's military, a leader in cyber warfare, steals foreign trade secrets to help the country's vast state-owned industrial sector.
The Houston Astros said Monday that they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet. The team is working with the FBI and Major League Baseball security to try who was responsible for the breach.
A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. Nearly 25 percent of consumers changed financial institutions due to dissatisfaction after experiencing fraud.
The United States will urge China to resume discussions on cyber security that were abruptly suspended after the Americans charged five Chinese military officers with hacking into U.S. companies to steal trade secrets. After the indictments against the five officers were unsealed in May, Beijing pulled the plug on the group that had been set up a year ago in what Washington.
Video: All Recoveries are Not Equal:Print and Mail Operations Often Require Additional ConsiderationJune 23, 2014 9:18 am | Videos | Comments
Chris Durfee, Director of Sales and Marketing for MailGard, discusses why some items, like print and mail operations, sometimes require extra consideration during recovery and why not all recovery projects are created equal.
Target Corp. said a glitch in its system caused delays at checkout registers at some of its U.S. stores but it wasn't due to a data security issue or a hacker. Customers across the country took to social media to report long check-out lines Sunday night due to registers not working.
Recent incidents have prompted Kimberly Hirsch, Senior Business Partner with Target Corporation, to leverage remote workplace alternatives in the event of facility outages. Hear her thoughts in this week’s video installment. Stay tuned for next week’s video where Chris Wright with Amgen, emphasizes the importance clear roles and responsibilities during your exercises.
Continuity Insights spoke with Mark Carroll, Senior Vice President and Business Risk Officer at Income Research + Management, to discuss the cloud, its various business applications and some of the risk factors it brings for business continuity professionals.
Avalution Consulting – a leading provider of business continuity consulting and software solutions – announced today the release of the Business Continuity Management (BCM) 101 educational video series. The six videos in BCM 101 provide straightforward answers to the most common business continuity-related questions
A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.
The report by China's Internet Media Research Center, cited Tuesday by the official Xinhua News Agency, mentioned media reports of former NSA contractor Edward Snowden's leaks and said a subsequent investigation by Chinese authorities "confirmed the existence of snooping activities directed against China."
"The ruling has significant implications for how we handle takedown requests," Google spokesman Al Verney said. "This is logistically complicated, not least because of the many languages involved and the need for careful review. As soon as we have thought through exactly how this will work, which may take several weeks, we will let our users know."
An admitted computer hacker who helped the FBI thwart hundreds of cyberattacks on government and corporate computer systems will be freed from prison. Hector Xavier Monsegur (HAH'-vee-ehr MAHN'-see-gur) was sentenced Tuesday in Manhattan to the time he already served — seven months.
The hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage, according to a grand jury indictment. "Success in the international marketplace should be based solely on a company's...
SanDisk Corporation (NASDAQ: SNDK ), a global leader in flash storage solutions, today announced the inaugural members of its broad ecosystem of independent software vendors (ISV) for security management. This unique ecosystem provides SanDisk customers with fully certified solutions to ease the deployment...
In the first installment of this series, Mark Carroll, senior vice president of business risk, with Income Research+ Management, talks to "The Roles of the Cloud Provider and the Customer." Stay tuned for next week's episode, when we speak with Kathy Lee Patterson, business continuity project manager with Independence Blue Cross in Philadelphia on engaging senior management.
The survey, commissioned by Red Hat through CIO Strategic Marketing Services /IDG Research Services polled 100 respondents at the IT director level and above at organizations with 1,000 or more employees about the current and future roles of CIOs.
Gregg Steinhafel, who was also president and chairman, stepped down nearly five months after Target disclosed a huge pre-Christmas breach in which hackers stole millions of customers' credit- and debit-card records. The theft badly damaged the store chain's reputation and profits.
Continuity Insights and KPMG LLP Survey: Oversight of Business Continuity Management Increasing; More Oversight Still RequiredApril 28, 2014 10:06 am | by Continuity Insights and KPMG | News | Comments
According to a new survey report released today by Continuity Insights and sponsored by KPMG LLP, the U.S. audit, tax and advisory firm, there are varied levels of business continuity management (BCM) program maturity across organizations as well as significant opportunities....
The 2014 BCI North America Awards, held during the DRJ Spring World Welcome Reception, span 10 categories and recognize the outstanding contribution of business continuity professionals and organizations living in or operating in North America. Winners were chosen by a panel of BCI-appointed judges.
People who have accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the confounding Heartbleed Internet security flaw.
- Page 1