After Kansas Heart Hospital suffered a ransomware infection and paid the demanded ransom, its attackers demanded more. At that point, the hospital reportedly declined to comply, relying instead on its pre-prepared backup and recovery plan.
The integration of technology within the
healthcare sector continues to create seismic
changes in how individuals receive medical
care. Yet in their rush to adopt technology
designed to improve the consumer's
experience, organizations within the healthcare
industry face the very real threat of sensitive
patient...
Too few organizations have in-house incident response teams. As a result, they lack the native ability to even detect evolving threats, such as ransomware, says Ann Barron-DiCamillo of Strategic Cyber Ventures in this video interview. What are the must-have response capabilities?
Officials in several nations are probing the security of the SWIFT interbank messaging system in the wake of recent hacker attacks. Can the bank-owned cooperative better police members, secure access to its network as well as spot emerging hack attacks and fraud?
Banks and regulators have begun reviewing SWIFT-related information security practices and requirements following the online heist of $81 million from Bangladesh Bank. Authorities say much of that money is still missing.
In a shocking twist, the developers behind the TelsaCrypt ransomware have apologized for their ransom campaign and released a master decryption key, which all victims can now use to unlock the malware.
In today's rapidly changing cyber threat environment, the federal government needs to take a lead role in making sure mobile device security is adequate, says security researcher Stephen Cobb, who analyzes ongoing investigations by the FTC and FCC in this audio interview.
In this white paper, Fidelis Cybersecurity outlines key steps to take in the first 72 hours of detecting an alert, how to distinguish what type of incident you are facing and the key differences on how to respond. Based on our firsthand experience, we provide lessons learned from the front lines to explain why it is...
In this in-depth white paper, Fidelis Cybersecurity will illustrate how the Rapid Detection and Response Model (RDRM) helps organizations to accelerate their ability to detect, investigate and stop attacks by ensuring the organizations is prepared from a people, process and technology perspective. The model is based...
Cyberattacks are increasing in frequency, complexity, nuance and stealth. But human error, business compulsions and increasingly complex environments make it difficult to maintain adequate defenses, says Juniper Network's CTO for India and SAARC
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Organizations chosen for remote "desk audits" of their HIPAA compliance, which will begin this summer, need to be prepared to quickly provide supporting documentation, Deven McGraw, deputy director of health information privacy at the HHS Office for Civil Rights, explains this in-depth audio interview.
In this white paper, Fidelis Cybersecurity outlines key considerations to take into account when deciding how and when to expel attackers from the network. Based on our first-hand experience, we provide case study lessons learned from the front lines to explain why it is important to understand what type of incident...
The amount of sensitive information managed by business is
immeasurable. Proprietary data, intellectual property, personal
data collected from employees, former employees and job
applicants - all create a treasure trove of data, and IT has the
seemingly insurmountable challenge of securing it without
impeding...
Novetta Cyber Analytics is an advanced network traffic capture, inspection and analytics application for medium to large enterprises and government agencies. Designed to ensure rapid detection of breaches, significantly reduce attacker dwell times, and enable immediate remediation to reduce further exposure, Novetta...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.