One measure of why it's so difficult for organizations to keep their software patched and better secured: Of the nearly 20,000 unique vulnerabilities in 2,000 products cataloged last year, only half involved Microsoft, Adobe, Java, Chrome or Firefox software, says Flexera's Alejandro Lavie.
Are federal regulators beginning to slack off on HIPAA compliance enforcement? While some observers say the lack of recent settlement announcements could signal the start of a lasting trend, others contend that HHS remains committed to aggressive HIPAA enforcement.
With the cybersecurity threat landscape growing and evolving
rapidly, many enterprises and other large organizations are
seeking more effective ways to protect themselves and their
employees from these threats.
One of the most effective strategies for doing this is to take a more
dynamic and proactive approach to...
Whether you've visited the Dark Web or not, you're likely aware that
it's comprised of various anonymous forums and black markets.
Many of these Dark Web black markets are used for illegal activities,
like buying and selling drugs, weapons, confidential documents
and illegal services. While you may not be in the...
When it comes to the internet of things, balancing the need to protect privacy against the need for technological innovation, such as to improve healthcare, is proving challenging, says attorney Jean Marie Pechette.
A recent global survey found that two-thirds of companies are seeing sales delays because of data privacy questions coming from their customers, says Robert Waitman of Cisco.
Security leaders have been addressing the global skills gap for over a decade, with little to show for it.
However, a new approach - leveraging software as a service - is making up for the staffing shortfall.
The discussion really starts with software as a service. If you look at the benefits of leveraging the cloud...
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
Facebook is making substantial investments to improve its data security and privacy practices. But the long-term cost of those investments and impact on the bottom line has spooked investors, leading to a $120 billion loss in market value on Thursday, the largest one-day loss of value for a U.S. traded company.
There's no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we've seen a continued increase in attacks that directly target financial
organizations, which comes as no surprise. However, increased access to user and account data has...
In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a "double-edged sword" when using web-based technologies. As we've increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has the digital attack...
Cyber threat intelligence (CTI), when used correctly, provides visibility into attacks and
threats. However, security analysts are dealing with too many sources of intelligence. They
aren't able to correlate and narrow all these sources of intelligence to those events and
vulnerabilities that really matter. The...
Facebook has promised to bring machine learning to bear on the problem of hate speech and information warfare via its platform. But insiders have been urging the company to pursue a major cultural change, including prioritizing not doing anything "creepy" over the quest for short-term gain.
Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant authorities or face fines. The U.K.'s data privacy watchdog says it's already seen the volume of self-reported breaches quadruple.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.