Target CFO Grilled in Senate Hearing

Posted by:

Do you think the team at Target had knowledge of their exposure and were ultimately responsible for their data breach?

Does Trustwave share in the responsibility for the breach?

Senator John Rockefeller attempts to get to the bottom of things yesterday.

Following the release of a new Senate report that analyzed how Target Corp. possibly missed several opportunities to prevent a massive data breach last year, Sen. John Rockefeller, D-W.Va., grilled the company’s CFO at a ...

Read More →
0

Solving Cloud Security Will Open Adoption Floodgates

Posted by:

cloud security solutionI don’t know about you but there are a couple of additional barriers to Cloud solutions that are likely to prevent rapid adoption.  However, we would agree with Steve Wexler, it’s a big barrier.

Would your company be more likely to implement a Cloud solution if you knew it was secure? More importantly, what proof would be adequate to persuade you to ...

Read More →
0

Big Data Analytics: Is It The Future Of IT Security?

Posted by:

big data analyticsIf you’re not using analytics tools to support your IT Security Risk Management efforts what are you using in their place?

Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA.

“We are really at the beginning of intelligence-driven security: it is just the tip of ...

Read More →
0

Improving Security via Proper Network Segmentation

Posted by:

We all strive to create 100% secure network but if the bad guys want to get in they’re going to.  Simple as that.  In the mean time there’s no point in creating a single point of failure architecture. Nimmy Reichenberg takes a look at “zoning” and how this can be an effective control to mitigate risk and hamper the bad guys if they do penetrate your network.

By properly segregating the network, you are essentially minimizing the level of access to ...

Read More →
0

Electronic data breach bill advances in Kentucky Senate

Posted by:

Data Breach Legislation

FRANKFORT, KY. — A bill to require most state and local government agencies to notify citizens of any electronic breaches of personal information unanimously passed the Senate State and Local Government Committee on Monday.

State Auditor of Public Accounts Adam Edelen, who had accused Senate Majority Floor Leader Damon Thayer, R-Georgetown, of blocking consideration of the bill, released a statement thanking Bowen.

I appreciate Sen. ...

Read More →
0

Morrisons employee arrested in Leeds in connection with massive pay-roll breach – Techworld.com

Posted by:

 

If you’re working in an organization that’s spending a good chunk of their IT security budget trying to keep the bad guys out then you need to pay attention to this article. No matter how much you spend you’re going to be remiss in your efforts if you don’t start looking from the inside out. Take a lesson from the folks at Wm Morrison.

British supermarket Wm Morrison has confirmed that one of its employees has been arrested in connection ...

Read More →
0

How to Defend Against Identity Theft This Tax Season

Posted by:

 

As if tax time didn’t create enough stress in your environment along come the cybercriminals hacking your tax returns.

Did you know that during the first nine months of 2012 there was a 62 percent increase in the number of identity theft cases detected by the IRS.

Cybercriminals are prowling the web for ways to access people’s personal information so they can cash in on their identity. The hackers have various ways of stealing taxpayers identity, ...

Read More →
0

Social engineering attacks: Is security focused on the wrong problem?

Posted by:

social engineeringMalicious social-engineering attacks are on the rise and branching out far beyond simply targeting the financial sector. While some organizations develop employee-awareness training or solicit pen testing, or use some combination of the two, these preventive tactics can only go so far.

Adopting a “know thy data” approach — in terms of what it is, how valuable it is and where it is — and then ...

Read More →
0
})
SEC Cybersecurity Exams