Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
Boards of directors continue to overlook IT risk management, security and privacy as a top agenda item, says Jody Westby of Carnegie Melon CyLab. Where are the organizational gaps that need to be filled?
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.
Insider fraud schemes at three banks in Minnesota, Texas and California illustrate just how difficult it is for institutions to thwart inside jobs. So what steps should banks take to mitigate their risk?
At a time when information security sees record growth - in every sector, there are more open positions than professionals to fill them - ISMG's new Job Board offers new resources to job seekers and employers alike.
Data breaches are growing, but Verizon's Chris Novak says most incidents could be prevented by more diligent database monitoring. So what specific steps should organizations take to mitigate their risks?
Programs from Carnegie Mellon and the University of Maryland come at a time when organizations not only can't find enough IT security professionals to hire to meet their needs, but often lack the leadership to oversee IT security initiatives.