The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Leading this week's industry news roundup, BAE Systems launches a corporate security analysis service to assist companies with social risk monitoring, while Arbor Networks appoints its first chief technology and security officer.
The biggest 2014 U.S. health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, according to a new infographic, which highlights patient risks and takeaways for healthcare organizations.
If the top breaches of 2014 taught the security world anything, it's that size and sector don't matter - all organizations are vulnerable. This infographic takes a look at the top incidents and the lessons security leaders took away from them.
Sony Pictures in late November suffered a significant cyber-attack that led to intellectual property and personal employee details being leaked online. The following infographic provides an overview of the events leading up to, during and after the breach.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Leading this week's industry news roundup, Trend Micro and Hewlett Packard collaborate to help fight advanced targeted threats and custom malware, while First Data and VeriFone partner to expedite EMV compliance.
This past year saw the revelation of three massive security bugs that existed for lengthy periods of time before they were discovered. This infographic details those exploits and just how long they went unnoticed.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
How can banking institutions prepare for beefed up cybersecurity exams by regulators next year that likely will scrutinize their security awareness efforts? One federally funded training program could help.