Nissan Canada Finance, which provides financing for Nissan and Infiniti vehicle buyers and leasers, is warning 1.13 million current and former customers that their personal information may have been stolen.
When you launch a VDI or RDSH initiative, you are going to impact the daily lives of people throughout your organization. You can't afford to make mistakes. This reality points to the need to avoid the common pitfalls of VDI and RDSH projects.
Download this whitepaper and learn how to:
Put together the right...
The consumerization of the enterprise represents both a challenge and an opportunity for IT. Implementing a digital workspace solution can help IT harness the rapid changes brought about by consumerization and address the needs of the full range of users and use cases within the business.
Download this whitepaper...
IT's inability to support consumer-like user experience not only hinders productivity, but also presents risk to corporate data as users are likely to seek out alternative solutions or loopholes.
Download this whitepaper and learn how:
"Shadow IT" can be turned into a positive for your organization;
In an era where users are working simultaneously across mobile,
social and cloud applications and platforms, organizations need
to deploy identity and access management solutions that can scale
and adapt quickly. That's where IDaaS comes in. It simplifies
that onboard experience for the employee and gives...
The hacker to whom Uber paid $100,000 to destroy data and keep quiet about its big, bad breach is a 20-year-old man living in Florida, Reuters reports. But numerous questions remain about the 2016 breach, including whether the payment was a bug bounty, extortion payoff or hush money.
In an era where users are working simultaneously across mobile, social and cloud applications and platforms, organizations need to deploy identity and access management solutions that can scale and adapt quickly. IBM's Sean Brown describes the rise of Identity as a Service.
An employee of the NSA's Tailored Access Operations group has pleaded guilty to mishandling classified information. The material ended up in the hands of Russia after he copied it to his home computer, which had Kaspersky Lab's anti-virus software installed.
There has been a global rise in incidents of omnichannel financial fraud; such as a phishing attack being used to collect account information, then using that data to commit fraud via a bank's call center globally. Financial institutions need to enhance their ability to detect this sort of fraud - while also reducing...
Canadian citizen Karim Baratov has pleaded guilty to targeting more than 11,000 webmail accountholders to steal their passwords, including targeting 80 Gmail accounts at the request of an alleged Russian intelligence agent tied to a 2014 hack attack against Yahoo that exposed 500 million accounts.
The U.S. government has charged three employees of Chinese cybersecurity firm Boysec with stealing valuable intellectual property from Siemens, Moody's Analytics and Trimble. Security researchers say Boysec has been operating since 2007 and is also known as APT 3 and Gothic Panda.
Are you an accused Russian hacker who's been detained on foreign soil at the request of U.S. authorities? Bad news: While Mother Russia will go to court to try to bring you home, your odds of resisting U.S. extradition don't look good.
Reports that a plea deal is about to be reached for Karim Baratov - extradited from Canada to the United States on charges that he assisted Russian intelligence agents with the massive hack of Yahoo in 2014 - are premature, his attorney tells Information Security Media Group.
The steady stream of new reports about years-old breaches continues as Imgur, the popular photo-sharing service, belatedly warns that it suffered a breach in 2014 that compromised 1.7 million users' accounts.
Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money?