About 30 new health data breaches - including a phishing attack impacting 1.4 million individuals - have been added in recent weeks to the official federal tally, pushing the total victim count for 2018 so far to 6.1 million.
The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources.
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
Getting employees involved in data security requires explaining the benefits, such as avoiding service interruptions, says Paul Bowen of Arbor Networks, who offers insights on making security part of the daily routine.
As customers spend more and more money online each year, the opportunities for fraud increase in parallel; experts project a loss of $24 billion to payment card fraud by the end of 2018. Payment card fraudsters rely on a sophisticated ecosystem and support network that provides a wide range of credit card details,...
The alluring promise of gold inspired almost half-a-million to risk it all and rush to California in the mid-20th century in hopes of striking it rich. Although gold mining was fruitless for the most part, cunning opportunists profited off of desperate '49ers by selling synthetic gold or mines of no real value. A...
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.
Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
What can be done to address the shortage of personnel to fill the ever-expanding roster of cybersecurity jobs - from entry-level positions through the CISO role? (ISC)2's John McCumber describes organizational and governmental efforts to lower barriers to entry and build tomorrow's workforce.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Download this thought-leadership whitepaper...
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.