6 Questions About the Partners Breach

Breach Notification Comes Five Months After Phishing AttackPartners HealthCare System is the latest healthcare organizations to suffer a data breach following a phishing attack. But why did Partners wait five months to... Read more »

Partners HealthCare Reports Breach

Latest Phishing Attack One of Many in Healthcare SectorPartners HealthCare System announced that it is the latest healthcare organization hit by a data breach attributed to a phishing attack. The records of... Read more »

Malaysia’s Cybersecurity Agenda

Malaysia's cybersecurity chief believes awareness is vital to establish security readiness to stay ahead of threats. Dr. Wahab's agenda includes developing security centers of excellence to fight threats. Read more »

Helping Cybercrime Takedowns

Malware researchers can track important technical details about attacks, but shutting down cybercrime networks requires law enforcement agencies to take the next step, says Alexander Erofeev of Kaspersky Lab. Read more »

Threat Intelligence: Standards Required

To deliver effective information sharing and threat intelligence, the security industry must settle on a single set of threat-sharing standards, says David Duncan of the Internet security firm Webroot. Read more »

Adobe Plans to Settle Breach Lawsuit

Class-Action Suit Was Filed Over Compromised Cards, AccountsAdobe Systems plans to settle a class-action lawsuit filed after its 2013 breach. By settling, Adobe avoids potentially damaging public discussions about its security practices,... Read more »

Securing the Corporate Brand

Rogue applications designed to impersonate a company's corporate brand are increasingly prevalent, offering attackers an easy way to fool online users into downloading malicious apps aimed at compromising credentials, says Arian Evans... Read more »

Bracing for Uptick in CNP Fraud

As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at... Read more »

Securing Access from Anywhere

To secure the growing number of devices being used within enterprises requires organizations to be sure they're providing the right access to the right resources for the right people, says Ping Identity's... Read more »

Automating Cloud Security

As organizations move toward storing and processing more data on the public cloud, security needs be automated and based on sound policies to mitigate growing threats, says HyTrust President Eric Chiu. Read more »