Photos of the weekend – Christian Science Monitor

Photos of the weekend
Christian Science Monitor
There's a race going on between hackers, governments, and companies to discover zeroday vulnerabilities. Continue reading… Subscribe to The Christian Science Monitor · Global Galleries · Photos of the day 02/10. Latest News. EPA scientists held back …

zero day – read more

Arby’s May Have Caused Data Breach of Credit Cards – Highland Mirror

Arby's May Have Caused Data Breach of Credit Cards
Highland Mirror
In its defense, Arby's Restaurant Group Inc. gave a comment to The USA Today saying that an investigation had been launched soon after they had learnt that a breach might be taking place at the card system payments at the restaurant. As soon as the …
Fast Food Chain Arby's Acknowledges Breach — Krebs on SecurityKrebs on Security

all 53 news articles »

data breach – Google News

As third RSA Conference without ‘booth babes’ nears, no one seems to miss them

In March 2015, RSA Conference organizers made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.

Next week’s RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  

Here’s how the contract language read in 2015:

All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:

To read this article in full or to leave a comment, please click here

Network World Paul McNamara

What cyberinsurance gotchas companies must be ready for – Networks Asia

What cyberinsurance gotchas companies must be ready for
Networks Asia
These plans are designed to spell out the exact steps a company must follow in the aftermath of an attack or data breach. These steps help ensure that the incident is handled in a manner that helps limit the damage caused and reduces recovery time and …

data breach – Google News