The Obama administration proposes to spend $3.1 billion next year to seed a fund designed to improve cybersecurity by modernizing federal IT. It's part of a legislative proposal to establish a board of government IT security experts to identify the highest priority modernization projects.
A House committee is seeking information about security breaches at the Federal Deposit Insurance Corp. in the wake of a former employee "inadvertently' departing the agency with a storage device that contained sensitive data on more than 44,000 individuals.
Security experts are once again warning all Flash users to either update or uninstall the browser plug-in software to protect themselves against active exploit kit attacks that are targeting a zero-day Flash flaw to install ransomware.
Organizations spend over 10 percent of their IT budgets on security, yet breaches continue to rise. Much of the problem revolves around the fact that most organizations have countless point tools, most of which don't work together to keep the organization secure and responsive.
A court has approved settlement of a class-action lawsuit filed by employees of Sony Pictures in the wake of its massive 2014 breach. But some legal experts say the consumer protections provided in the settlement do not go much beyond what the company should have routinely provided to victims in the wake of a breach.
New guidance from the National Institute of Standards and Technology could help make it easier and less expensive for organizations to encrypt and decrypt some forms of data, including Social Security and credit card numbers.
The massive 'Panama Papers' leak demonstrates how law firms are at risk from internal and external attackers seeking to access confidential information. Experts offer insights on how these firms, and others, can better defend their clients' secrets.
Government auditors question the effectiveness of a U.S. military response to aid civil authorities during cyber-related emergencies because it's unclear which one of two defense units would lead such operations.
As Medstar Health completes its recovery from a recent malware attack that led to a temporary shutdown of most of its systems, other U.S. hospitals continue to struggle with similar attacks, many of them involving ransomware. What risk mitigation steps are most essential?
Luxury hotel chain Trump Hotels is investigating a possible breach that some security sources say targeted the chain's point-of-service system. If confirmed, it will be the second card breach suffered by the chain in less than a year.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
Federal regulators have quietly released an updated, extremely detailed protocol for use in phase two of HIPAA compliance audits of covered entities and business associates later this year. Experts say the protocol also can be a helpful tool in self-assessing compliance as well as security strategies.
To fight the growth of card fraud, retailers need to take a multichannel approach, says Randy Vanderhoof of the EMV Migration Forum. In addition to EMV, retailers must invest in tokenization and encryption, he says in this video interview.
Federal regulators have issued new guidance urging healthcare organizations and business associates to bolster their cyberattack defenses. The advice comes after a string of recent high-profile attacks on hospitals.
Security experts worldwide are sorting through the implications of the so-called "Panama Papers" leak, involving 11.5 million records. The documents highlight an elaborate web of offshore holdings that everyone from heads of state to celebrities and fraudsters have allegedly used to hide billions of dollars.