Reported Data Breaches Double in New Zealand
Data breach notifications in New Zealand more than doubled in the year ending June 30, 2013 climbing to 107, New Zealand’s Office of the Privacy Commissioner stated in its annual…
DetailsData breach notifications in New Zealand more than doubled in the year ending June 30, 2013 climbing to 107, New Zealand’s Office of the Privacy Commissioner stated in its annual…
DetailsAkamai Technologies, Inc. (NASAQ: AKAM) today announced that it had signed a definitive agreement to acquire Prolexic Technologies, Inc. for approximately $370 million, in a deal expected to close during…
DetailsSeveral UK banks and financial market infrastructures experienced cyber attacks, some of which disrupted service, in the past six months according to the Bank of England. “While losses have been…
Details(Updates with the reported retraction from the two researchers regarding a link between Bitcoin and the Silk Road marketplace.) Recent speculation that Dustin Trammel is the mysterious inventor of Bitcoin and…
DetailsSo, how did you do this year with your security budget requests? And how does the plan look for next year? With information security representing a competitive arms race with…
DetailsTwitter Inc. said it has enabled Perfect Forward Secrecy (PFS) in a move to increase protections around users’ information following reports of secret data mining by the National Security Agency…
DetailsThe PCI Security Standards Council (PCI SSC), a worldwide forum that develops payment card security standards for its corporate members, has published its latest version of those standards for implementation…
DetailsTaxpayer data is at risk as disgruntled insiders or malicious outsiders can exploit security weaknesses and the Internal Revenue Service (IRS) should take action, the US Treasury Inspector General For Tax…
DetailsWhat is the top threat to web applications today? According to the Open Web Application Security Project (OWASP), it’s SQL injection. The problem is so pervasive that it has topped the OWASP…
DetailsBring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train…
Details