After Commonwealth Bank of Australia (CBA) financial staff inadvertently didn't include an ".au" on a domain name, the bank exposed information on 10,000 customers to a foreign company.
The Security of Network Information Systems (NIS) Directive, which aims to ensure that critical infrastructure is protected from cyber-attacks and computer network failure, has come into force today with fines for non-compliance.
All the tools reviewed allow organisations to collect, sift through and interact with the mounds of information and events generated by networks and devices, says technical writer Dan Cure.
BJC HealthCare in the US said a data storage error potentially compromised 33,420 patient records when the information was accidentally made publicly available for nine months.
Researchers have found that browsers like Chrome and Firefox store a great deal of visitor information, much of which can be easily discovered and taken by cyber-criminals.
Intel is stating the reason behind its decision to not inform industry organisations and the US federal government of crucial flaws in its processors is it was following established industry reporting standards.
Oracle recently patched a Micros point-of-sale vulnerability which could have allowed an attacker to read any file and receive information about various services without authentication from a vulnerable MICROS workstation.
Cyber-criminals have been using pornography and adult content as a lure to spread malware and steal information since it hit the internet, but recent research shows that access to sites is also fueling a lucrative trade on the dark web.
Just two months after the car-sharing service admitted to covering up a breach that exposed sensitive information on 57 million customers and drivers, a security researcher has discovered a flaw.
India's national ID database containing the information of nearly 1.2 billion people was breached with cyber-criminals selling access to the information for US$ 8 (£6), though officials deny the extent of the incident.
An amateur hacker who has titled himself 'Nexus Zeta' has managed to exploit the Huawei home router HG532 by finding all the necessary information on online forums just a few days before carrying out the attack.
To be known as PESCO, the body will allow member states to jointly develop military capabilities, invest in shared projects and enhance their respective armed forces.
SMEs in particular, face a significant challenge to correlate the output from various systems and interfaces. It is therefore important that the right tools are chosen to empower SMEs to meet these challenges says David Feldman.
The UK's new National Cyber Security Centre (NCSC) officially opens for business today as a public-facing part of GCHQ that acts as a focal point for the government to deliver authoritative advice on tackling cyber-security issues.
Josh Goldfarb asks how can the infosec community move from informal and exclusive trust circles to more mature formal information sharing approaches, without losing agility and effectiveness.
Shared intelligence is needed by businesses as threats become more sophisticated.
Organisations depend on information to operate, thrive and prosper and the information itself is increasingly the core of the business.