cybersecurity
How to Avoid Being a Hacker Victim
Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article
Federal State of Cyber Insecurity: New Day, New Breach?
When the United States government accused China of hacking the Office of Personnel Management and gaining access to the records of 4 million current and former federal employees, it ...Full Article
Average Data Breach Costs $3.8 Million, Ponemon Finds
When an organization's records are breached, it costs an average of $3.8 million to overcome the attack, according to the newly released Ponemon Institute's "Cost of Data Breach Study: ...Full Article
Social Engineering Targets Weakest Security Link: Employees
Without ongoing employee training, an enterprise's expensive security infrastructure investment means little. But very few corporations protect themselves from the growing threat of social engineering. Today only 7 percent ...Full Article
Data Breach Costs Could Hit $2T by 2019
Data breaches focused primarily on "traditional computing devices" rather than emerging connected devices are expected to increase the cost of cyber crime to an estimated $2.1 trillion by 2019, ...Full Article
SAS Kicks Off Global Forum with Bevy of New Products, Research
SAS kicked off its annual SAS Global Forum with a flurry of new product releases and research reports focused on bringing together business users and data scientists, and unifying ...Full Article
Wikileaks Posts Hacked Sony Files in Searchable Database
In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article
Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches
Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article