Critical issues that must be addressed to pave the way for broader exchange of health information are expanding the use of multifactor authentication and data encryption and making broad improvements in identity management, says David Kibbe, M.D., president and CEO of DirectTrust.
Yet another study reveals that millions of people are picking weak passwords, with "123456" remaining our collective favorite. Rules requiring stronger passwords and not forcing passwords to expire both could help boost security.
Seven state insurance commissioners conclude in a new in-depth report that the massive cyberattack on Anthem Inc. was carried out by a hacker on behalf of a nation-state. But they stop short of naming the nation involved or penalizing Anthem for the breach that affected 80 million.
Far too many healthcare organizations and their business associates are still neglecting to address some data security basics, says privacy and security expert Rebecca Herold, who recommends they resolve to take three critical steps in the new year.
Will more "historical" breaches be revealed in 2017 and beyond? Data breach expert Troy Hunt is optimistic that such revelations will become rare as large businesses operating online continue to improve security. But what about small and mid-size organizations?
In this special edition of the ISMG Security Report, DataBreachToday Executive Editor Mathew Schwartz discusses the Russian groups behind damaging hacks against the U.S. and Strategic Cyber Ventures CEO Tom Kellermann details cyberthreats posed by the West's nation-state adversaries.
Hacks sponsored by nation-states and attacks fueld by IoT-powered botnets are just some of the daunting threats we will see in 2017, says cybersecurity thought leader Tom Kellermann. What are his top predictions, and how should security leaders respond?
How Are Leading Institutions Finding the Balance Between Effective Cybersecurity and a Seamless Customer Experience?
It's every banking institution's quandary: How do you introduce the right cybersecurity controls to protect customer accounts and transactions - but without introducing new hurdles that might...
The financial sector continues to be a prime target for highly sophisticated, customized attacks. The SWIFT money transfer system recently came under attack resulting in an $81 million heist of the Bangladesh Bank. This number pales in comparison to an estimated $1 billion stolen from over 100 banks worldwide by the...
The emergence of contactless chip payments on mobile phones is changing the way transactions are authenticated and secured, Jeremy King of the PCI Security Standards Council explains in this audio interview.
Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories.
And because these attacks are going to continue to result in big headlines, cybersecurity is going to grow as...
The world is transforming, blending the physical and digital into an age of convergence. Is your agency prepared for the resulting security challenges? Drawing upon the deep resources of both Forcepoint Security Labs�� and Raytheon, the 2017 Forcepoint Security Predictions report investigates this new shift that blurs...
Forcepoint�� Stonesoft® NGFW earned a "Recommended" rating in the NSS Labs Next Generation Intrusion Prevention System (NGIPS) Comparative Report for overall security effectiveness, performance and TCO. Stonesoft outperformed IPS-only products while also providing next-gen/cloud-based firewalling, VPN connectivity,...
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
Federal regulators are urging healthcare sector organizations to reassess whether their authentication methods need strengthening to help prevent breaches. But does their advice go far enough in advocating multifactor authentication?