There is no such thing as 100 percent security, so what does a truly successful security program look like? Mike Gentile of Auxilio describes the key elements of a formal program and how best to deploy them.
The recent cyber-attack on health insurer Anthem Inc. is a "call to action" for the healthcare sector to adopt a much more sophisticated approach to risk management, says security expert Lisa Gallagher of HIMSS.
The massive cyber-attack against health insurer Anthem makes it crystal clear that the healthcare sector has become a new favorite target for hackers. So what needs to be done to defend against hacks?
News that health insurer Anthem Inc. suffered a massive breach after hackers gained access to a corporate database illustrates yet again the healthcare sector's vulnerability. This infographic takes an updated look at the top five health data breaches.
In the aftermath of the Sony Pictures Entertainment cyber-attack in late November 2014, Amy Pascal, who had embarrassing e-mails leaked in the breach, is stepping down as co-chairman.
Health insurer Anthem Inc. has suffered a massive data breach after hackers gained access to a corporate database reportedly containing personal information on as many as 80 million of its current and former U.S. customers and employees.
Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
A new report claims that Russian hackers, using spear-phishing attacks, breached the Sony Pictures Entertainment network by November 2014. But it's not clear whether they were responsible for the "G.O.P." attacks attributed by the FBI to North Korea.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Universities remain prime targets for hackers due to their data-rich environments. Maintaining a culture of openness while ensuring the security and privacy of sensitive information will be an ongoing challenge for the education sector.
In addition to dealing with sophisticated threats to SCADA and IC Systems, utilities have to address specific regulatory requirements like NERC Critical Infrastructure Protection (CIP) Cybersecurity Standards.
Download this whitepaper to:
read a summary of the NERC CIP requirements;
identify the key security...
When shopping in-store, customers want and expect connectivity - plus they are inclined to buy more when they have a personalized shopping experience. However the cyber security responsibility falls directly on the retailer to protect their customers and the company's reputation from the next data breach.
Download...
As a 20+ year leader in check fraud detection and prevention, Fiserv has the unique opportunity to observe market trends related to RDC and check fraud. During this webinar you will hear from Mike Urban with Fiserv Financial Crime Risk Management, who will discuss these trends and the specific capabilities banks need...
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.