Figuring out how Edward Snowden breached NSA computers is sort of like solving a puzzle. Take public information and match it with an understanding of how organizations get hacked, and the pieces seem to fall into place.
Attorneys discuss the significance of the 10-year prison sentence for hacker Jeremy Hammond, who pleaded guilty in connection with a 2011 breach of Stratfor, a global intelligence firm that provides services to the U.S. government.
U.S. Attorney Steve Wiggington says identity theft, especially linked to card skimming, is still the No. 1 fraud threat facing financial services institutions as well as consumers. He stresses information sharing is critical for fighting fraud.
The breach of a card loyalty marketing company has reignited discussions about the roles banking institutions, regulators and others play when it comes to mitigating third-party risks. Where should the buck stop?
Organizations must guard against making three common mistakes when conducting an investigation of a data breach or fraud incident, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
The Army Research Laboratory is collaborating with five research universities on a $23 million, 5-year initiative to develop what's being characterized as a new science to detect, model and mitigate cyber-attacks.
Senior leaders in business and government are buying in to the need for more cybersecurity investments as well as threat-intelligence sharing, new research shows. But why are they still struggling to hire the right security pros?
Prosecutors have charged a resident of Great Britain with hacking thousands of U.S. government computers, including those at the U.S. Army and a number of federal agencies, to steal massive amounts of confidential information.
Organizations must develop a "defensible response" to data breaches and fraud incidents because of the likelihood of a regulatory investigation or legal action, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.