The Department of Health and Human Services has slapped Excellus Health Plan with a $5.1 million settlement in the wake of a 2015 data breach that affected more than 9.3 million individuals.
The physical breach of the U.S. Capitol by a violent mob, members of which allegedly accessed lawmakers' systems and stole devices, offers cybersecurity professional lessons to learn on authentication, encryption and more, says cybersecurity expert Brian Honan.
See why Forrester analysts rank IBM as a Leader for risk-based authentication in this new report. We believe that IBM's integration of our fraud protection and access management technology, advanced authentication options, and risk-based adaptive access capabilities helped us earn this recognition.
Register now to...
Cybersecurity is a legitimate - and significant - business risk, and it's time to frame the topic appropriately, says Robert Hill, CEO of Cyturus. He shares insight on how to discuss cyber risk appropriately with C-level leadership and the board of directors.
The COVID-19 pandemic has had a global impact on lives and businesses.
Expanded use of video conferencing and online services has enabled remote
workforces to continue operations. However, the need to quickly respond and
adapt to the situation may have caused some organizations to overlook security
implications....
Watch this webinar with renowned cybersecurity innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner to lean about the biggest challenges facing security teams today.
With digital transformation come new applications and efficiencies in the cloud. But governance, visibility and access challenges also emerge. Ron Bennetan of Imperva shares strategies for improving data governance and security in the cloud.
With COVID-19 as a backdrop and 5G on the horizon, what will be 2021's top issues in identifying, protecting and defending against attacks across a dramatically expanded threat landscape? This latest CEO/CISO panel addresses the challenges of the new year.
The Cyber Risk Institute this week is releasing a new version of its "Cyber Profile" risk assessment framework for the financial services industry that includes expanded information on third-party risk and cloud security. Institute founder, Josh Magri, describes the updates.
Newsflash! The NIST Cybersecurity Framework was never intended to be something you could "do." It's supposed to be something you can "use."
.But that's often easier said than done. The CSF can be a confusing and intimidating process to go through. So, if you're at a loss about how to implement it, you're not alone.
...
COVID-19 infections are hitting new daily highs in the U.S., and some European countries are re-imposing restrictions. Plus, the flu season is just around the corner. "We're in a bad place," says pandemic expert Regina Phelps, who shares insights on pandemic trends and response.
Federal regulators have slapped health insurer Aetna with a $1 million HIPAA settlement for three 2017 breaches - including a mailing incident that exposed HIV information - that occurred within six months.
In today's IT environment, one of the biggest risks to a corporation's valuation is a security breach. Security Vendors make wide claims about the effectiveness of their products - making it almost impossible to identify the right vendor for your security needs.
From scanners and traditional pen tests to bug bounty...
In 2019, the IBM Institute for Business Value Performance Data and Benchmarking Program worked with Oxford Economics to measure the performance/effectiveness and maturity of the Mergers and Acquisitions (M&A) functions of 720 acquirers in the electronics, chemicals and petroleum, healthcare and pharma industries....
As organizations have navigated their way through return to office scenarios, there are a number of new employee expectations and employer considerations to think through. Rather than only focusing on the point-in-time circumstances of "secure work-from-home" operations, many organizations are considering a proactive...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.