A review of the month's top stories by Managing Editor Tracy Kitten: A well-crafted e-mail tricked an RSA employee into opening a phishy e-mail that launched a sophisticated attack on the company's information systems, and the list of big-name corporations and brands affected by the Epsilon e-mail breach tops 100.
Sony Corp.'s announcement that hackers may have accessed data on 77 million gamers follows a long line of recent breaches. And Neal O'Farrell of the Identity Theft Council says the string of incidents has led to consumer 'breach fatigue.'
A focus on cost and speed, not on data protection, creates a security hole, a survey of cloud computing service providers reveals. Nearly two-thirds of providers say they aren't confident cloud apps are sufficiently secured.
"If you want to defend your computer completely, you better not connect it to the Internet, not use it, not even power it on. So we got to get to a different place." DHS Deputy Undersecretary Philip Reitinger says.
The U.S. Supreme Court heard arguments Tuesday in a healthcare privacy case dealing with the power of states to bar data mining companies from selling information about doctors' prescription-writing habits to drug companies.
"We took our understanding of the tools, tradecraft and techniques used by these malicious actors, and converted it into actionable information that ... would lower their risk to the type of attack we saw at RSA," DHS Secretary Janet Napolitano says.
Well-publicized health information breach incidents are serving as important reminders that paying attention to the physical security of data centers is a vital component of any information security strategy.
After firing off a letter to Apple Computer CEO Steve Jobs that questions the secret tracking, Sen. Al Franken schedules a May 10 hearing before a Senate Judiciary subcommittee he chairs on protecting mobile privacy.
Texas spent $1.2 million to notify individuals - as many as 3.5 million - whose personal information were exposed, $393,000 to established a call center and $290,000 to retain two IT consultants to examine the agency's IT security policies and procedures.