After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
"The trend here is the level of fines that the regulators are putting out there," says Tony Wicks, AML and fraud-detection expert. "$7 million does not sound that great, but for the size of an institution like Pacific National, it is substantial."
Although many hospitals and clinics are paying attention to HIPAA and HITECH Act compliance, they also need to train their staffs on how to crack down on identity theft and credit card fraud, security specialists say.
Former New York State CISO Will Pelgrin is expanding his influence over information security nationwide as chief executive officer of the newly revised Center for Internet Security that encompasses MS-ISAC and the U.S. Cyber Challenge.
Three recent breach incidents, each involving the loss or theft of back-up drives, illustrate that some organizations are doing a better job than others in informing consumers about the steps they're taking to prevent more breaches.
Although many organizations are using encryption to protect data on mobile devices, they're often overlooking other important ways to prevent health information breaches, says Terrell Herzig, information security officer at UAB Medicine.
Known as the Citizen Patrol Unit, the group of some 30 civilian volunteers has been tasked with monitoring pay-at-the pump terminals throughout one community, looking for signs of tampered terminals or the installation of illegal skimming devices.
While Japan's nuclear emergency puts local citizens at risk, there is much that organizations globally can learn from the crisis. "I hope that all of us look at this and ask 'What can I do to be better prepared?'" says Regina Phelps, disaster recovery expert.
A comprehensive bill to dramatically change the way the federal government addresses cybersecurity could pass the Senate as early as this summer, Sen. Thomas Carper, who chairs a Senate panel with IT security oversight, says in an interview with GovInfoSecurity.com.