The FBI and Justice Department are investigating a 2014 hack that compromised systems owned by the Houston Astros professional baseball team, which was allegedly launched by the rival St. Louis Cardinals.
India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today.
Data breaches at companies such as Target, Home Depot, Staples, eBay, Sony Pictures Entertainment, and the U.S. Office of Personnel Management are just the tip of the iceberg. This white paper will look at the essential building blocks required to strengthen an organization's cyber threat defense, allowing you to...
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
Exasperated House Oversight Committee Chair Jason Chaffetz faults OPM Director Katherine Archuleta for not embracing a 2014 inspector general recommendation to shutter unauthorized IT systems that hackers eventually breached.
Warning to LastPass users: Change your master password and ensure you're using multi-factor authentication. There has been a data breach that might allow attackers to crack passwords and reminders.
Forget attributions of the German parliament malware outbreak to Russia, or Chancellor Angela Merkel's office being "ground zero." The real takeaway is the Bundestag's apparent lack of effective defenses or a breach-response plan.
Traditional network and endpoint defenses are outmatched and don't stand a chance at preventing, investigating, or remediating today's targeted attacks. You need an advanced security solution, but you are struggling to convince your company's executive team and Board to make the investment.
If you want to make your...
Improving your security posture takes more than simply implementing a new solution. How can you continue to improve your ability to find and stop advanced attackers?
The answer depends on your internal capabilities, existing investments, your tolerance for risk and many other factors. Our quick self-assessment will...
In the wake of a May cyber-attack against the IT infrastructure of Germany's lower house of parliament, or Bundestag, investigators say they have been unable to eradicate all traces of the Trojan infections, and that up to 20,000 PCs might need to be replaced.
Indian companies increasingly are victims of business e-email compromise, as hackers leverage social media networks and perform phishing attacks. Tarun Wig, co-founder at Innefu Labs, shares insight.
The investigation into the U.S. Office of Personnel Management breach has reportedly found that foreign spies may have stolen deeply personal information on up to 14 million current and former federal workers, going back three decades.
A massive breach at the U.S. Office of Personnel Management wasn't discovered by government sleuths - or the Einstein DHS intrusion detection system - but rather during a product demo, a new report says.
In a constantly changing threat landscape, how do practitioners decide which investments will help get the best security? Juniper's Sajan Paul shares key insight from a new RAND Study on the subject.
Khalid N AI Hashmi, undersecretary of cyber security at ministry of communication and information technology, says resilience and security in cyberspace are vital to Qatar's continued success and growth.,
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.