Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyber attacks.
Stories by Jaikumar Vijayan
With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.
With enterprise adoption of managed security services gradually maturing, the rewards and risks of using such services have become a lot clearer.
More IoT devices connected to the network increases the attack surface and requires greater coordination between IT and OT
Two sets of emails obtained by Al Jazeera America under a Freedom of Information Act request suggest that Google's cooperation with the National Security Agency may have been less coerced than the company has let on.
The FTC can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches.
Unrelenting privacy concerns finally derailed a controversial big data initiative that promised to deliver more individualized instruction to public school students in the U.S.
In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week.
Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices.
A group representing 22 of the world's largest banks is pushing for broad adoption in the U.S. of payment card technology called tokenization, citing shortcomings in the planned migration to the Europay MasterCard Visa smartcard standard over the next two years.
Migrating U.S. payment systems to the Europay MasterCard Visa (EMV) smartcard standard could take significantly longer than envisioned and offer fewer security benefits than what's being touted by proponents of the technology.
A majority of companies that achieve annual compliance with the Payment Card Industry Data Security Standard fail to then maintain that status, leaving them vulnerable to breaches.
The massive Target breach led to revelations that many companies use Internet-connected heating, ventilation, and air conditioning (HVAC) systems without adequate security, giving hackers a potential gateway to key corporate systems.
The massive data breach at Target last month may have resulted partly from the retailer's failure to properly segregate systems handling sensitive payment card data from the rest of its network.
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
Register your interest now for EDGE 2024!