Stories by Jaikumar Vijayan

Healthcare organizations still too lax on security

By Jaikumar Vijayan | 20 August, 2014 06:25

The data breach at Community Health Systems that exposed the personal information on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry.

About 4.5M face risk of ID theft after hack of hospital network

By Jaikumar Vijayan | 19 August, 2014 05:19

About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.

Supervalu breach shows why move to smartcards is long overdue

By Jaikumar Vijayan | 16 August, 2014 20:49

The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.

Grocery stores in multiple states hit by data breach

By Jaikumar Vijayan | 16 August, 2014 03:36

A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.

Tennessee firm blames bank for $193K cybertheft

By Jaikumar Vijayan | 14 August, 2014 05:30

A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.

Senator wants curbs placed on fitness data use

By Jaikumar Vijayan | 12 August, 2014 06:29

Sen. Charles Schumer (D-N.Y.) wants the U.S. Federal Trade Commission to investigate the data gathering and sharing practices of makers of personal fitness devices and applications.

PCI Security Council moves to boost service providers' credit card security

By Jaikumar Vijayan | 09 August, 2014 04:15

The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data.

Russian credential theft shows why the password is dead

By Jaikumar Vijayan | 08 August, 2014 06:27

News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.

Cybersecurity should be professionalized

By Jaikumar Vijayan | 06 August, 2014 06:25

The time is ripe for professionalizing cybersecurity, according to Salve Regina University's Pell Center for International Relations and Public Policy.

Microsoft ordered to turn over customer data stored in the cloud

By Jaikumar Vijayan | 01 August, 2014 20:00

Microsoft has been ordered to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland.

Attackers exploit remote access tools to compromise retail systems

By Jaikumar Vijayan | 01 August, 2014 06:09

Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.

CISOs still struggle for respect from peers

By Jaikumar Vijayan | 01 August, 2014 02:58

Chief information security officers (CISOs) continue to have a hard time gaining the respect of other C-suite executives despite the heightened focus overall on information security.

There's still a security disconnect on BYOD

By Jaikumar Vijayan | 12 July, 2014 03:12 | 1 Comment

Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.

NSA defends collecting data from U.S. residents not suspected of terrorist activities

By Jaikumar Vijayan | 08 July, 2014 06:34

The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.

Hackers hit more businesses through remote access accounts

By Jaikumar Vijayan | 02 July, 2014 22:01

Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

AVG Internet Security 2011 Business Edition

Ultimate protection for your small or medium-sized business

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.