The U.S. State Department's unclassified email system was breached by hackers at the same time that the White House network was breached, according to a report by Nextgov.
More than half of U.K. firms would consider hiring a hacker or someone with a criminal record to tackle new cyber challenges, according to a survey by KPMG of 300 senior IT and HR pros at U.K. organizations.
The common complaint: IT security lacks mature metrics and scientific rigor. In other words, it's guesswork. But there are plenty of sources for IT security risk management, to help you better prioritize controls and spending. You just have to know where to look. Read more at our special report. Access is free for FierceCIO newsletter subscribers. Click here to read or subscribe
In this week's Editor's Corner, I would like to take a deeper dive into IBM's X-Force threat intelligence report for the 2014 fourth quarter, particularly its discussion of Internet of Things security.
The Justice Department recently warned top Apple executives that new encryption technology being loaded onto new iPhones will prevent law enforcement from accessing a kidnapper's phone and could result in a child dying, the Wall Street Journal reports, cited sources who attended the meeting.
Cyberattackers are focusing on privileged accounts as their enterprise entry point for advanced persistent threat attacks, according to a study by CyberArk with participation by Cisco, Deloitte, Mandiant, RSA, and Verizon.
IT security pros are frustrated with the inadequacy of their firm's incident response (IR) program, according to a survey of 259 IT pros by the SANS Institute on behalf of Alien Vault.
Some entity commandeered a database belonging to the city of Detroit in April, freezing the system and ordering a bitcoin ransom of more than $800,000 for return of control. Lucky for then newly-inaugurated Mayor Mike Duggan, the information on the index was not critical to city operations, and they were able to evade the pricey demand.
A recent report confirms what many of us already suspected: 2014 has been the worst year for data breaches. And it's not even Thanksgiving yet.
From Our Sister Sites
FierceCIO recently spoke with Cisco CIO Rebecca Jacoby for her take on the top trends in IT for 2014, and what she expects will dominate her thoughts in 2015.
Check out the hottest mobile IT news for Friday, Nov. 21, including Amazon launches Zocalo file-sharing app for Android and iOS, Apple releases app development kit for Apple Watch, Google launches BYOD-focused Divide app, IoT app enablement platform revenues to increase 28 percent this year and Apple supplier GT Advanced promised too much and failed to deliver.