The Latest News

  • Anthem Refuses Full IT Security Audit

    Watchdog Agency Says Insurer Won't Allow Vulnerability Scans Anthem Refuses Full IT Security Audit

    Anthem Inc. has refused to allow a federal watchdog agency to conduct vulnerability scans of its systems in the wake of its recent massive data breach. The health insurer also refused to allow scans by the same agency in 2013. Read more...

  • Ebola Nurse Sues for Privacy Invasion

    Lawsuit: 'Highly Personal' Information Inappropriately Released Ebola Nurse Sues for Privacy Invasion

    A nurse who contracted Ebola while caring for an infected patient is suing her employer for negligence, invasion of privacy and fraud. Learn about the allegations in the case. Read more...

  • Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks? Read more...

  • Lawsuit Filed in Insider Breach

    Alleges Patients Didn't Get Privacy Protection They 'Paid For' Lawsuit Filed in Insider Breach

    A class action lawsuit has been filed against a hospital company and a business associate for an insider breach that affected more than 82,000 individuals. The suit alleges patients didn't get the privacy protections they "paid for." Read more...

  • Anthem Breach: 78.8 Million Affected

    Investigation of How Much Data Was Actually Stolen Continues Anthem Breach: 78.8 Million Affected

    Anthem Inc. now confirms that the health insurer's recent data breach compromised a database containing personal information on 78.8 million individuals, with information on millions potentially stolen. Read more...

  • Blog

    Clinton's Email Brouhaha and Politics

    Coverage Focus Segues from Secrecy to Security By Eric Chabrow
    Clinton's Email Brouhaha and Politics

    Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.

  • Article

    Could Costs Impede Info-Sharing Plan?

    Scrutinizing Obama's Cyberthreat Information Sharing Strategy By Eric Chabrow
    Could Costs Impede Info-Sharing Plan?

    Small and mid-size businesses might not be able to afford participating in voluntary programs to share and receive cyberthreat information, as President Obama has proposed, industry representatives tell Congress.

  • Article

    Apple, Android Prep 'Freak' Fix

    Exploiting Crypto Flaw Breaks HTTPS on Devices, Sites By Mathew J. Schwartz
    Apple, Android Prep 'Freak' Fix

    Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.

  • Article

    Dumped Records Case Illustrates BA Risk

    Incident Shows Why Business Associates Are a Big Worry By Marianne Kolbasuk McGee
    Dumped Records Case Illustrates BA Risk

    A recent incident involving disposed in a vendor's dumpster is an example of why healthcare organizations say business associates taking inadequate security steps ranks as their No. 1 perceived breach threat today.

  • Article

    Reversal of Fortune: DHS Funding OK'd

    Boehner Persuades Enough GOP Lawmakers to Back Measure By Eric Chabrow
    Reversal of Fortune: DHS Funding OK'd

    Congress has voted to fund the Department of Homeland Security through September, the end of the fiscal year, averting another threatened shutdown that would have curtailed some cybersecurity programs.

More news...

Webinars

More webinars...

White Papers

  • HP Cyber Risk Report 2015: Executive Summary

    The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers...

  • HP Security Research: Cyber Risk Report

    Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses...

More whitepapers...
ARTICLE Report: 'Wiper' Malware Hit Casino Firm

A report claiming that Las Vegas Sands Corp. was hit with a "wiper" malware attack back in...

Latest Tweets and Mentions

ARTICLE Report: 'Wiper' Malware Hit Casino Firm

A report claiming that Las Vegas Sands Corp. was hit with a "wiper" malware attack back in...

The ISMG Network