The organization that manages IT for Singapore's public healthcare sector says it has terminated, demoted or financially penalized several employees for their roles in the handling of a 2017 cyberattack on SingHealth, the nation's largest healthcare group. What do U.S. security experts think of these measures?
Although the Reserve Bank of India mandated that banks complete the shift from magnetic stripe debit and credit cards to EMV chip-and-PIN cards by Jan. 1 to help reduce fraud, there's still plenty of work to be done.
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly...
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly...
The battle against Russian disinformation is far from over. Two in-depth Senate reports have revealed that such campaigns continue despite efforts by social media companies to cleanse their platforms. Researchers say Facebook's Instagram may be the next battleground.
Hackers have been plugging inexpensive hardware into banks' local area networks to help perpetrate heists that have stolen tens of millions of dollars, warns Kaspersky Lab. It says that since 2017, the "DarkVishnya" attack campaign has hit at least eight Eastern European banks.
The healthcare sector is making progress in moving from a reactive to a proactive approach to cybersecurity as it learns lessons from other sectors, including financial services, says Greg Garcia, executive director for cybersecurity at the Healthcare and Public Health Sector Coordinating Council.
To combat cyberattacks, more nations must not only hold nation-state attackers accountable, but also better cooperate by backing each other's attribution, said Estonian politician Marina Kaljurand, who chairs the Global Commission on the Stability of Cyberspace, in her opening keynote speech at Black Hat Europe 2018.
SWIFT hacks happen when cybercriminals get in between the customer's network and the SWIFT network. There, they can change or reroute messages and even currency, making even one successful SWIFT hack highly lucrative.
However, these cyberattacks can be prevented with a strong security posture and absolute...
In October of this year, the banking industry unveiled its new Cybersecurity Profile to help financial institutions develop and maintain cyber risk management programs. This groundbreaking document - the culmination of two years' work - marries the NIST Cybersecurity Framework with the finance sector's highly complex...
Making his first appearance at an ISMG Summit, Jeremiah Osburn draws upon his nearly two decades of experience in the military, government and private sector to discuss a variety of topics, including:
Mitigating the insider threat
Staffing up in a post-breach environment
How to address the cybersecurity staffing...
Identity theft is the fastest growing
crime in the US. Globally, 1 in 60
online transactions are fraudulent.
That presents a huge financial
and reputational risk for regulated
businesses if they get their KYC
wrong. As more services move
online and fraud techniques mature,
document and biometric...
Patient identity management is the prescription for improving remote patient access, portal adoption and patient satisfaction. Forward-thinking enterprises have realized that integrated proven strategies for identity management are a significant factor in success for both patients and providers.
Today's...
Identity fraud cost the United States $16.8 billion in 2017. For Financial Services, the issue is acute. Thanks to a recent spate of data breaches, SSNs and other traditional identifiers are no longer fit for purpose. But without identity verification, new customers can't be onboarded.
Increasingly strict KYC and...
Protecting the Department of Health and Human Services' systems, data - and program beneficiaries - from evolving cyberthreats is a top challenge for the agency, according to a new report that recommends action items.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.