In May 2015 the Healthcare sector received an overall SurfWatch Labs' risk score that was equal to its six-month average, indicating that the sector experienced the expected level of risk for the month. As is typical of the sector most of the reported cyber crime fell into the Healthcare Facilities and Services...
President Obama proposes spending more money on cybersecurity, replacing government agencies' antiquated, unsecured systems. But what really needs to be done to thwart breaches, like the hack attack against the Office of Personnel Management?
As hackers increasingly focus their attacks on the government and healthcare sectors, it's more critical to ensure that consumers' personal data is handled securely on Obamacare's HealthCare.gov website as well as state health insurance exchanges.
China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution.
The 'Cybersecurity Domino Effect' is a new term to describe the cumulative impact of multiple data breaches. How should organizations and individuals respond? Michael Bruemmer of Experian offers guidance.
In this audio report on a Senate hearing, the federal CIO justifies his backing of Office of Personnel Management Director Katherine Archuleta as she defends retaining a contractor whose stolen credentials may have led to the breach.
An error in a coding upgrade for a Blue Shield of California website resulted in a breach affecting 843 individuals. The incident is a reminder to all organizations about the importance of sound systems development life cycle practices.
Cybercrimes targeting healthcare organizations are growing and evolving, and much can be learned from recent breach investigations, says James Nettesheim of Mandiant, a FireEye company.
As threats evolve, healthcare organizations are embracing new solutions to protect health data. But data protection is not enough, says Microsoft's Leslie Sistla. Detection and response strategies are required.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.
Listen to an audio report on a House hearing where key federal lawmakers explain why Katherine Archuleta should be fired as Office of Personnel Management director in the wake of what could be the largest government breach ever.
This industry-first research looks at how well early corporate social media compliance programs are functioning in a difficult environment by analyzing the content posted to over 32,000 Fortune 100 social accounts. It provides a taxonomy of the most common incidents, real-world examples, key operational challenges,...
Social Media account hacks are a nightmare for any organization. Accounts are hijacked to embarrass the brand, distribute malware, and manipulate stock prices. This guide presents a step-by-step process for protecting your organization from social media account hacks.
Download this white paper to explore:
...
Significant cost drivers have placed the cloud firmly in the sights of CIOs. Unfortunately, these drivers have often been stalled by a fear that the cloud is an exposed environment that is not only difficult to secure but also a regulatory nightmare. Fortunately, there are concrete mechanisms that can protect cloud...
The impact of today's organized cybercrime is felt across the financial and e-commerce sectors globally. As more people access
financial services and accounts from personal devices, service providers and their users have become the primary targets for online
fraud. Everyday, newer and more inventive scams trick...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.