The attackers behind the hack of dating site Ashley Madison - tagline: "Life is short, have an affair" - have followed through on threats and released a file that includes details on many of the site's customers.
Security risks of real-time mobile payments increase as adoption of mobile devices and applications grow. PwC's Suhas Desai shares risk mitigation strategy through application and mobile security best practices.
The legal climate around cyberspace is gaining maturity, with nations such as China looking at the domain as being an integral part of national security. Cyber law expert Pavan Duggal shares insight on this evolution.
Application Programming Interfaces have security vulnerabilities that pose significant business risk. CA's Vic Mankotia cautions security leaders about how they manage APIs to secure digital identities.
The Internal Revenue Service says cyber thieves may have accessed as many as 334,000 taxpayer accounts in a breach of its Get Transcript system, far more than the 114,000 accounts it originally estimated in May.
What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common? Researchers say the answer is shockingly simple.
Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
In the wake of the APT30 report's revelations, FireEye's Ranndeep Chonker talks about the Indian government's approach to information security and its primary challenges in dealing with APT types of attacks.
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
A new report says the Department of Health and Human Services has several security weaknesses that may have contributed to five recent data breaches. But are other healthcare entities guilty of the same mistakes?
Given that hacking is an everyday threat to most organizations, reliable security depends on understanding the exposure, weaknesses and threats that could lead to a breach in the defences, says PWC's Wouter Veugelen.