A 2015 incident involving unauthorized access to a database that healthcare professionals use to check insurance eligibility of patients appears to have resulted in a breach affecting 220,000 individuals, according to just-released details.
The number of reported U.S. data breaches hit an all-time high in 2016, according to Identity Theft Resource Center. But for half of all breaches, the number of exposed records isn't known. And what about all of the breaches that just haven't come to light?
Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network performance burdens for organizations that wish to inspect encrypted traffic.
The first in a series on encryption, this technical brief...
Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such as security effectiveness, deployment options, performance and administrative capabilities.
Since cybercriminals prize new threats...
Examining the causes of a cyberattack that blacked out Ukraine's power system leads the latest edition of the ISMG Security Report. Also, a report on the Anthem breach and commentary on President-elect Donald Trump's characterization of cybersecurity.
In 2016, organizations experienced the greatest number of data breaches. A checkbox approach to security does little to help ensure protected data remains secure. Organizations must create a practical action plan to accomplish many goals, such as ensuring endpoints are secure, minimizing the risk of breaches, and...
Sen. Marco Rubio: Don't think of the Russian-government breach of Democratic Party computers as merely an attempt to influence the presidential election, but rather as a sophisticated campaign aimed to spread disarray through the government and society.
Seven state insurance commissioners conclude in a new in-depth report that the massive cyberattack on Anthem Inc. was carried out by a hacker on behalf of a nation-state. But they stop short of naming the nation involved or penalizing Anthem for the breach that affected 80 million.
Hack analysis: The latest edition of the ISMG Security Report closely examines the U.S. intelligence community's assessment of how the Russian government allegedly tried to influence the American presidential election through breaches, social media and fake news.
President-elect Donald Trump reportedly now accepts the U.S. intelligence community's assessment that Russia attempted to meddle in U.S. elections and may take action in response once he takes power, an aide says.
The English-language broadcaster RT, which has been closely linked to the Kremlin, is part of an ongoing Russian operation designed to sow distrust in democratic institutions, according to U.S intelligence agencies. Our collective poor cybersecurity practices only make its mission easier.
The latest episode of the ISMG Security Report focuses on the clash between President-elect Donald Trump and the U.S. intelligence community on whether the Russian government directed the hack of Democratic Party computers to influence the American presidential election.
Hackers will hack, but any attempt to attribute attacks back to an individual, group or state apparatus too often involves political agendas, cybersecurity marketing moves, attempts to deflect blame or outright errors of interpretation.
Determined cyber attackers invade even the best security defenses with the same stealth as wolves creeping up on sheep; if they make themselves known before you spot them, it's too late. Attackers only need to successfully invade once to cause serious damage, but preventing them all is simply not possible.