The Department of Health and Human Services offers a model for applying multifactor authentication for privileged users, a new report illustrates. On the other hand, a second report shows HHS, like many healthcare organizations, is struggling to manage wireless security vulnerabilities.
Why is the Asia-Pacific region lagging far behind Europe and the United States in detecting data breaches? Rob van der Ende, vice president at FireEye's Mandiant, analyzes the results of the firm's new M-Trends Report 2016 for the Asia-Pacific Region and pinpoints breach detection shortcomings.
Medical device cybersecurity is an important area of focus that needs a brighter spotlight. But a new report questioning the security of certain cardiac devices from St. Jude Medical Inc. raises some serious ethical issues about the whistleblowers.
Hacker attacks added to the HHS Office for Civil Rights "wall of shame" tally of major health data breaches in recent weeks have affected a total of more than 8 million victims. But it's not just hacker attacks that are racking up big breach victim totals.
A Florida healthcare provider that treated victims of the Pulse nightclub massacre in June is notifying patients impacted by a breach involving record snooping. The incident spotlights common privacy and security challenges.
If leading intelligence agencies can seemingly hack a wide variety of IT gear, what hope is there for enterprise security? Experts describe how organizations should respond to the recent dump of attack tools from the Equation Group, which is widely believed to be tied to the NSA.
By nature of its name and reputation, the so-called "dark web" has acquired a unique reputation. Danny Rogers of Terbium Labs discusses some of the key myths and realities about the dark web, as well as how organizations should monitor it.
Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.
In this video interview, Global Cyber Alliance CEO Phil Reitinger explains how the vastness and complexity of the internet creates cyber vulnerabilities, but one day those same characteristics, if used properly, could mitigate cyber threats.
The Equation Group tools released by the Shadow Brokers have revealed that the U.S. National Security Agency has been able to decrypt any traffic sent using a Cisco PIX device. While Cisco no longer supports the devices, more than 15,000 remain in use.
Eighty percent of the Android ecosystem - an estimated 1.4 billion devices - is vulnerable to an attack affecting TCP. While the flaw has been patched in Linux, Android remains vulnerable, although Google is aware of the issue.
USB devices and ports pose serious risks, and they aren't going away anytime soon. But researchers say they've developed a way to block malicious actions by USB devices to help prevent attacks such as "BadUSB."
Medical device cybersecurity must be recognized as a critical public health issue so that all segments of the healthcare sector understand their roles in addressing the many complicated challenges involved, says Dale Nordenberg, M.D., of the Medical Device Innovation, Safety and Security Consortium.
In an in-depth interview, Ron Ross of the National Institute of Standards and Technology explains pending revisions of guidance on how organizations outside the U.S. government should protect sensitive federal data.