By: - Independent Computer Security Analyst

@gcluley

Fears Grow of Home Depot Data Breach, Exposing Customers’ Payment Details

September 4th, 2014

DIY retail chain Home Depot might be the latest big company to be hit by a serious data breach, after suspicions started to circulate that hackers had broken into its systems and manage to steal credit and debit card data. For understandable reasons, Home Depot is working hard to reassure consumers about the situation – […]



By: - Independent Computer Security Analyst

@gcluley

Supervalu Shoppers At Risk After Hackers Steal Credit Card Details – and other stores affected too

August 18th, 2014

Customers who have used their credit cards at a US supermarket chain between June 22nd and July 17th 2014 are being warned to check their bank balances, after it was discovered that criminals had hacked their way into networks and potentially accessed shoppers’ private data. Supervalu has published a security advisory on its website, warning that […]



By: - Information Security Reporter

@kevtownsend

What Does the Target Breach Tell Us About DSS and POS?

March 10th, 2014

In the final analysis, it is going to be Target’s customers that pay the price for this winter’s breach. OK, CIO Beth Jacob has fallen on her sword and departed; but that could hardly be avoided, and “this is a good time for a change” is hardly contrition. Apart from that, the innocent will pay […]



By: - Dir. Solutions Marketing

Ain’t No Style Points in Infosec

February 19th, 2014

It’s Winter Olympics time. I love watching them, especially safely ensconced in the American Southwest where we don’t have to deal with the snow and ice associated with the winter sports. Speed skating, (real) Biathlon, Hockey, Downhill and XC skiing, and all the rest of it. But my friend the sports curmudgeon complains about sports that rely on […]



By: - Dir. Solutions Marketing

Market Impact of a Data Breach

May 13th, 2013

In my Changeup post the other day, I mentioned that my colleague Paul Henry had saved an organization an estimated $10M (or roughly 15%) in market cap by showing that an intrusion had no material impact. That got me to thinking: what *is* the typical market impact of a breach? And furthermore, how good are […]



By: - Former SVP Global Marketing

@cedwardbrice

Checkmark Compliance Will Get You Nowhere But Hacked

May 7th, 2012

It used to be the only thing you could count on was death and taxes. But these days, you can bet on hackers going after your organization’s data too. Motives may differ – consider the hackers who want to make a statement and the cyber criminals who look to make a buck – but in […]



By: - IT Secured. Success Optimized.

@_lumension

PCI spotlight on Europe

September 23rd, 2010

Alan Bentley, SVP International Sales, Lumension, asks Bob Tarzey, Analyst and Director with Quocirca about the difference between PCI compliance and a strong security posture. Q: PCI standards are designed to be a starting point to helping build a strong security posture. Are retailers/organisations aware that they need to do more than achieve PCI compliance […]



By: - Software Entrepreneur Professional

Passing an External Audit Doesn’t Mean You’re Secure

August 14th, 2009

By now, most of us have heard of the data breach that affected Heartland Payment Systems.  It’s been front page news, and Heartland themselves went public with news of the breach in January 2009.  What many people might not know is that Heartland’s QSA (Qualified Security Assessor) had declared them as PCI compliant shortly before […]



By: - Product Marketing Executive, Mobile and Security Technologies Expert

@jeffreyfhughes

Naked Truth about Risk and Compliance: Bottom Up Vs. Top Down

June 8th, 2009

There’s no question about it, no matter the differences between line-of-business executives, CIOs and security practitioners, the one thing they all have in common these days is a shared dread of a ten-letter word: compliance. As regulations of technology practices have mounted over the years, most companies have struggled simply to keep ahead of the […]



By: - Dir. Solutions Marketing

Chris’ Security Cache Contemplation: Week 3

June 8th, 2009

Miscellaneous interesting news / tidbits I’ve run across whilst trying to keep up with/clean out my RSS feed … [Yeah, I know it’s been a while … sorry, but it’s been a busy week at my day job … and anyhow, I never said it’d be weekly, just that I’d only do it once a […]


By: - Dir. Solutions Marketing

Where the Money Is

June 8th, 2009

Willie Sutton is reputed to have said (although he didn’t, actually), when asked why he robbed banks, “Because that’s where the money is.” So, we’re not really surprised to learn that a new scam is on to liberate the contents of ATMs, and by more sophisticated means than the skimmers I’ve written about previously. Nope, […]


By: - Forensics and Security Expert

@phenrycissp

Are PCI Requirements Losing their Bite?

June 3rd, 2009

It’s been long discussed in the industry that  the requirements for PCI compliance were woefully inadequate and some have gone as far  as suggesting that PCI be replaced with some form of an independent governing body that would actually raise the standard rather than  simply appeasing the vendors to become compliant. One of the hot […]


By: - Former SVP Global Marketing

@cedwardbrice

Has Whitelisting Reached the Tipping Point in Endpoint Security?

May 27th, 2009

McAfee, one of the largest AV vendors in the security space, recently acquired Solidcore Systems, a company that sells dynamic whitelisting technology, in a $47 million dollar deal that would add whitelisting capabilities to McAfee’s current product portfolio. While this comes as no surprise, this move by McAfee is just the tipping point for the […]


By: - Former Chairman and CEO, Lumension

@pclawson

Open Letter to President Obama

March 2nd, 2009

First of all, I wanted to applaud your swift action to hire Melissa Hathaway to examine the nation’s cyberdefense strategies and move forward with a better plan. I think I speak on behalf of many within the information security field in saying that this is a positive step in securing the information infrastructure within the […]


By: - Dir. Solutions Marketing

Geeks.com Pwned by the FTC

February 26th, 2009

Sometimes, I’m sure, folks out there think we’re in the scaremongering business. Take, for instance, the notion that failing to protect your customers’ Personally Identifiable Information (PII) can expose your organization to both direct *and* indirect costs. You can find this notion in ad copy and whitepapers from almost all security vendors, us included. And […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com