Healthcare organizations must take a long view in their security risk management programs rather than focus on the "cyberthreat du jour," says security expert Bob Chaput, who explains why.
Federal agencies increasingly view open hybrid cloud platforms as effective tools to modernize IT and adopt agile development approaches.
Download this executive brief and learn how open hybrid cloud solutions allow federal agencies to:
Seamlessly integrate modern IT capabilities with existing...
Federal regulators have smacked a mobile heart-monitoring technology firm with a $2.5 million HIPAA settlement related to findings from an investigation into a 2012 breach involving a stolen unencrypted laptop. What factors led to the substantial penalty?
John Kelly, in his first speech as the U.S. homeland security secretary, says the American government can't combat the cyberthreat without the active collaboration of the private sector. "The government, God knows, can't do it by itself," Kelly says.
Hybrid clouds represent the new normal for data centers, which, in turn, warrants a new security model that needs to be grounded in an understanding about what is different about cloud infrastructure. IT and security professionals are well aware of the need to retool for this new normal.
Given strong adoption of...
In 2016, there were two contenders for king of ransomware: Locky and Cerber. So far in 2017, we've seen a massive shift in the battle between these two families, with Locky basically dropping out entirely and Cerber expanding its market share by a significant amount. New families such as Spora are emerging as well,...
A Colorado-based community healthcare center is the latest entity to learn an expensive lesson from federal regulators about the importance of conducting a timely and comprehensive risk assessment.
Cyberattacks are evolving at a much faster pace than the traditional security solutions can adapt to...so we must run to catch up. Machine learning and artificial intelligence (AI) assist a behavioral model of threat detection in an industry-leading alternative to traditional methods of endpoint security test suites....
Ransomware grabbed headlines in 2016, becoming the favorite attack used against businesses. However, ad fraud malware and botnets infecting Internet of Things (IoT) devices to launch massive DDoS attacks also became serious threats. So what should you expect from malware in 2017?
Download the 2017 State of Malware...
Cyber threats are constantly evolving, and federal government agencies must operate under the assumption that a motivated adversary can and will infiltrate their network environments. A security intelligence and analytics platform can simplify an agency's approach to cybersecurity by unifying and analyzing disjointed...
The U.S. regulation that forbid ISPs from selling information about web activity without a customer's permission is gone. But it's still possible to maintain privacy on the Web even if prying eyes are watching.
Since 2015, more than 22,000 organizations have fallen victim to business email compromise (BEC) attacks. The FBI estimates that organizations have lost an estimated USD $3.08 billion to these attacks.
Download this guide to protect your organization by learning:
How BEC works and why it succeeds: the targets and...
The Department of Homeland Security, which missed meeting last week's deadline for submitting a new cybersecurity strategy to Congress, could be months away from providing lawmakers with that policy, a top DHS cybersecurity official says.
Google has run out of patience with Symantec's digital certificate business. It has outlined a plan that over time will have its Chrome browser reject all of Symantec's existing digital certificates and force all of its future certificates to be reissued every nine months.
With the rapid changes in the threat landscape and the risks introduced by DevOps, the cloud and other new elements, organizations need to have a continuous vulnerability assessment program as a security baseline, says Richard Bussiere of Tenable Network Security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.