Russian hackers may think twice before traveling outside the country for a vacation in light of the arrest of alleged 2012 LinkedIn hacker "Yevgeniy N." by Czech police at a restaurant in Prague earlier this month.
Virtually every industry is prone to cyberattacks, online fraud and identity theft. For years' banks have secured online transactions for commercial accounts and private banking customers via multifactor authentication. Now through organizations like the NCSA and HIMSS, multifactor authentication may finally become...
Information security weaknesses that a watchdog agency found at the FDA are similar to those found at many healthcare organizations, some security experts say. But the FDA should be held to an even higher standard than the organizations that implement FDA-regulated drugs and devices, they argue.
Attackers have healthcare entities in their crosshairs, and their favorite targets are easily compromised credentials. Tracy Hulver of Synchronoss offers new ideas for how security leaders can better manage and secure identities.
A recent incident involving a vendor using a Boston clinic employee's credentials to inappropriately access patient data via a regional health information exchange illustrates the potential risks involved as the use of HIEs continues to grow.
To catch up with evolving payment processing trends with financial institutions around the world, a new directive was issued by the National Automated Clearing House Association (NACHA) to address the lack of "real-time or faster payment systems" in the United States. The first phase of this initiative began on...
The breach of porn site Brazzers - which allows users to swap fantasies in online forums - begs the question of how many users employed throwaway usernames and passwords. Some 1,446 U.S. military and 41 U.S. government email addresses were found in the data dump.
To the annals of super-bad historical mega breaches that no one knew about, add two new entries: Dropbox and Last.fm. Hackers reportedly stole tens of millions of usernames and passwords from each in 2012.
The Department of Health and Human Services offers a model for applying multifactor authentication for privileged users, a new report illustrates. On the other hand, a second report shows HHS, like many healthcare organizations, is struggling to manage wireless security vulnerabilities.
A Fortune 50 Healthcare Company is under constant scrutiny from about the safety and security of their products, data and services. The company relies on more than 5,000 suppliers to conduct operations. Existing vendor assessment and tracking methods and tools could not keep up. They implemented Rsam's Vendor Risk...
Due to the increase in security breaches over the past few years, you know that legacy approaches to data center security are not adequate. Micro-segmentation could be the answer - but what does it really mean and how do you do it? Read this solution overview to find out.
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Download this white paper to explore how