French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
In the more than a month since the Heartbleed bug was announced, many organizations have made progress in mitigating the risks. Security experts highlight gaps that remain and offer remediation advice.
Healthcare organizations are becoming a bigger target for cybercriminals because so much more clinical and financial information is now stored in potentially vulnerable information systems, says security expert Mac McMillan.
Several state attorneys general are investigating the data breach at eBay, which potentially exposed the encrypted passwords of 145 million customers. Plus, the New York AG is asking the company to provide free credit monitoring to those affected.
Supporters of a stronger version of the USA Freedom Act pin their hopes on the Senate after the House overwhelmingly approved a watered-down version of the measure aimed at curtailing the government's collection of American's phone records.
The arrests of more than 90 individuals for their alleged involvement in the use of BlackShades malware is a sign of progress in the global fight against cybercrime, but some experts question whether the crackdown will serve as a fraud deterrent.
There are a number of reasons why the U.S. government indicted five Chinese army officers for hacking American corporate computers to steal intellectual property. Bringing the assailants to justice isn't one of them.
Five Chinese military officers have been indicted for hacking U.S. companies - incidents that had major consequences, including the shuttering of three American steel plants, according to U.S. Justice Department officials.
What does "IT security as a business enabler" mean? For a definition, Gartner's Paul Proctor looks to the way IT managers at a European car maker translate security problems into a language a CEO can understand.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
Organizations looking to build a better breach response strategy need to emphasize the basics, including ensuring they have a well-qualified response team in place, security experts, including attorney Ron Raether, advise.