If the cyber theft of intellectual property attacks an organization’s ability to innovate, theft of business confidential information attacks its ability to execute as a business. Verizon’s 2014 Data Breach Investigations Report (DBIR) found that 22 percent of breaches are the result of cyber espionage attacks, and that the victims were in the public, professional […]

Timing is everything in an airport and to handle the growth in travelers and airlines at Cologne Bonn, the IT infrastructure includes several large networks and various system architectures, which must be harmonized and centrally operated. Cologne Bonn is a thoroughly modern airport that has many advanced procedures in place to help them manage everything efficiently. […]

Security professionals and hackers descended upon Las Vegas to take part in Black Hat USA 2014and DefCon conferences, recent news of the massive cybercrime operation that leached $3.75 billion over a two-year period from the Brazilian Boleto payment network is sure to enter the conversation. In his blog, our own Gary Davis indicated that the […]

“Yeah.” “No.” “Nothing.” “Good.” “Okay.” “Whatever.” Do you recognize that notorious bit of prose? It’s the six-word vocabulary list teens have conspired to use exclusively when talking to their parents. Add a mobile phone to that equation and that six-word list is reduced to a muffled “uh huh” . . . and that’s on a […]

Hackers have compromised the credit and debit card payment networks of Albertson’s and SuperValu, two of the nation’s most popular supermarket store chains. It appears the breach—caused by malicious software installed onto the company’s point-of-sale network by hackers—took place in late June or early July, and could affect over 1,000 stores. It isn’t clear how […]