Because the healthcare sector is a growing target for cybercriminals, organizations must implement security practices that look beyond HIPAA compliance and also address business associate risks, says risk management expert Kenneth Peterson.
New comments from the CEO of Sony Pictures about the film studio's response in the aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack risks.
"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance.
Atlanta-based fast-food chain Chick-fil-A is investigating whether its point-of-sale network has been breached after receiving reports of potential unusual activity involving payment cards used at a few of its restaurants.
At least 12 million home and small-office routers from 50 manufacturers have a flaw that an attacker could remotely exploit to seize control of the device, steal data and redirect users to attack sites, warns security vendor Check Point.
If the top breaches of 2014 taught the security world anything, it's that size and sector don't matter - all organizations are vulnerable. This infographic takes a look at the top incidents and the lessons security leaders took away from them.
Who hacked Sony Pictures? While the FBI still says North Korea ordered the online attack, new evidence suggests the hack may have been the work of insiders or hacktivists, and Russian-speaking attackers may have been involved.
As the NCUA Inspector General announces plans to investigate an October breach of sensitive customer data, former NCUA Chairman Michael Fryzel says breach response should be reviewed by all federal banking regulators.
The loss of thousands of paper records for those with coverage from health insurer Independence Blue Cross sends a strong reminder that all employees within organizations need to be trained on data security best practices.
The Union Home ministry has formed a five-member panel to devise a roadmap to tackle cybercrime. But do the members have the experience necessary to fulfill the mission? Security experts express reservations.
"The FTC has awoken to the reality that there can be no privacy without cybersecurity," says Trend Micro's Tom Kellermann, in the wake of an FTC complaint against a data broker that sold payday loan applications to third parties.
North Korea criticizes President Obama for backing the release of a comedy about the assassination of its leader, denies ordering the hacking of Sony Pictures and blames the U.S. for its Internet and mobile network outages.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.