In an exclusive interview, Harris Health System CISO Jeffrey Vinson explains how his team is spearheading an effort to help the federal government and the healthcare industry improve cyber threat intelligence sharing.
By identifying abnormal data access behavior, machine learning systems could improve breach prevention and fraud detection in the healthcare arena and other sectors, contends artificial intelligence expert Robert Leithiser.
Healthcare organizations should take three important steps to help improve the cybersecurity of medical devices used in their environments, says security expert Kevin Fu. Hear his advice in this interview.
Has authentication become too complex for banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning. He offers strategies to simplify and unify authentication strategies.
NACS attorney Doug Kantor says small businesses are getting a raw deal from the card brands when it comes to expectations for EMV migration. The expense is too high, and the fraud-reduction benefits too low to make EMV worthwhile, he argues.
Security leaders do well securing stored data and data in transit. But what about the integrity of data after it reaches the intended recipient? This is a huge gap to be bridged, says Chris Kniffin of Seclore.
In this audio blog report, hear why former NSA Director Mike McConnell changed his view on the value of the government getting device manufacturers to create a backdoor to allow law enforcement to bypass encryption.
BitSight Technologies is out with its annual Industry Benchmark Report, and cybersecurity ratings are low for the energy and utilities industry. BitSight's Mike Woodward shares insights for all sectors.
Recent breaches indicate that stronger controls are needed to protect key corporate assets - especially identities. CA's Steve Firestone discusses how to protect identities, while at the same time improving the user experience.
In the wake of the Oct. 1 EMV fraud liability shift date, U.S. merchants can expect to pay for counterfeit fraud losses previously absorbed by European issuers, says Jeremy King of the PCI Council. Longer-term, he expects European banks will experience more fraud as U.S. POS and card security leapfrogs other markets.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
Cybercrimnals are now using the Dyre and Dridex banking Trojans to gather massive amounts of data about individuals and companies that could enable them to track patterns of behavior, which might later help them evade intrusion detection, says Fox-IT's Eward Driehuis.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
The traditional Security Operations Center is out, and the new Security Intelligence Center is in. Greg Boison of Lockheed Martin tells how security leaders are winning business support for this evolution.
To improve patient safety, healthcare organizations should more closely scrutinize the cybersecurity of medical devices during the procurement process, says security expert Beau Woods.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.