Home Depot provides update on data breach investigation

Home improvement retailer The Home Depot, which revealed in September that its payment data systems had been breached, has disclosed additional information related to the company’s recent hacking incident. The findings are the result of investigations in cooperation with law enforcement and third-party IT security experts. The big revelation in the latest update is that, in addition to credit card data, […]

Read more

IBM releases product suite that aims to secure the cloud

IBM is putting added emphasis on its cyber security business, and yesterday the company announced a new suite of products and services designed to help secure cloud environments. The company said its new Dynamic Cloud Security portfolio addresses security gaps that can exist between on-premise, cloud, software-as-a-service and mobile applications. “Customers are now moving critical workloads to the […]

Read more

Raytheon buys cyber security provider Blackbird Technologies for $420 million

American defense contractor Raytheon reported today that it is beefing up its cyber capabilities with the acquisition of Blackbird Technologies, a Virginia-based provider of persistent surveillance, secure tactical communications, and cyber security solutions to the Intelligence Community and special operations market. The total cost will be approximately $420 million, Raytheon says. Blackbird currently supports customers in the […]

Read more

The digital economy is getting hammered

The digital economy is getting hammered with advanced cyber attacks. As a business executive your awareness of this issue grows daily and cyber security is now weighing on your mind. You are not alone. After interviewing 588 C-suite and Board-level executives, the Lloyds’ 2013 Risk Index reported that Cyber Risk is considered the 3rd highest business […]

Read more

Andrew Borene Appointed to Chair 2015 Cyber Security Summit

The 2014 Cyber Security Summit is less than two months away and will contain more actionable takeaways for attendees than ever before. (View this year’s agenda here.) However, with cyber threats showing no signs of slowing down, plans are already well underway for the 2015 Summit, beginning with today’s announcement of the 2015 Summit Chair: […]

Read more

Russian cyber theft results in more than 1 billion stolen credentials

This week marks yet another historic moment in cyber breaches: Security researchers say Russian hackers have stolen 4.5 billion records, gathered from more 400,000 websites, with 1.2 billion of these credentials appearing to be unique and belonging to over half a billion email addresses. This dwarfs the number of individuals affected by the Target data […]

Read more

USB ports can provide easy access points for cyber criminals

With new reports of data breaches seemingly occurring on a monthly basis, companies are regularly encouraging users to change their passwords to protect personal and financial information. The most recognizable methods of attaining this information are keyloggers, phishing scams, Trojans, and more recently the Heartbleed bug, which may still pose a threat to users who assume that […]

Read more

Goodwill working with secret service to investigate data breach

Following reports of the well-documented Target data breach in 2013, the need to improve the existing security framework to ensure that customer credit card numbers and other personal data are no longer at risk has been brought up by corporations and media alike. Target Corp. responded to their data breach with a change in CIO and […]

Read more

Survey: Most critical infrastructure businesses had a major security breach in the last year

Unisys Corporation recently sponsored a survey by the Ponemon Institute of 599 security executives of critical infrastructure providers. The top three functions of the respondents were chief information officer, business operations leader and IT security leader. According to the report, the research was conducted “to learn how utility, oil and gas, alternate energy and manufacturing […]

Read more

McAfee Labs threat report dives into key topics of the quarter

McAfee Labs recently released its June 2014 Threats Report. The report outlines key topics and threat statistics and is published every quarter. The report dives into four key cyber security topics of the quarter, which include: Almost 80 percent of the 300 Flappy Bird mobile game clones contained malware. Malware botnets that have virtual currency-mining capabilities. Despite previous […]

Read more

Symantec launches cyber security program to bridge workforce gap

At the 2014 Clinton Global Initiative America meeting yesterday, Symantec announced the launch of Symantec Cyber Career Connection, a program focused on closing the cyber security workforce gap by providing students with virtual mentorships, training, and cyber security internships. Symantec says it will assist program graduates in obtaining jobs through the use of its networks. According […]

Read more