Hillary Clinton and Donald Trump ventured into new territory for their first presidential debate: cybersecurity. It marked one of the few subjects on which both candidates broadly agreed, although the exchange was marked with sharp jabs and an interesting attribution theory from Trump.
Asked to explain the compromise of 500 million of its users' accounts, Yahoo appears to be trying to blame Russia. Of course, that would be an easy face-saving exercise for a publicly traded firm currently negotiating its $4.8 billion sale to Verizon.
Security expert Sean Sullivan isn't surprised that the massive 2014 breach of Yahoo, which exposed at least 500 million account details, only recently came to light. Here's why, as well as what users must learn from this breach.
In this latest edition of the ISMG Security Report, you'll hear an explanation why estimates from the Ponemon Institute and The Rand Corp. on typical enterprise data breach costs vary so widely. Also, analyses of a car hack, SWIFT's latest initiative to help banks mitigate fraud and the Yahoo breach.
There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks...
The healthcare industry - both payers and providers - has become a favorite target of threat actors. While 2015 was named the "year of the healthcare breach," 2016 has seen its share of large-scale attacks, especially in the form of ransomware. With the U.S. Department of Health and Human Services Office for Civil...
The handling of a recent data breach - the details of which are still unfolding - by Oakland, Calif.-based web services company Regpack provides a look into how the discovery and disclosure of a breach can turn into a real train wreck.
Ransomware is on the rise.
According to the FBI, an average of 4,000 ransomware attacks happen per day. Today's businesses are routinely choosing to pay hefty ransoms rather than lose access to their intellectual property, patient records, credit card information, and other valuable business data. Simply put,...
Is recently issued guidance from federal healthcare regulators clarifying when a ransomware attack needs to be reported starting to have an impact? Two recent breach notifications could be an early indication that the answer is yes.
As the Office of Personnel Management purged a hacker, another intruder who secretly infiltrated the system stole 20.5 million records containing personal information of government workers and contractors, a new GOP report says. Democrats dispute many of the report's key findings about security shortcomings.
If Russia is, indeed, meddling with the U.S. election, there's an obvious explanation: It's irritated by U.S. policy. But if Russia's frustration is being expressed through cyberattacks, how can the U.S. respond?
The ISMG Security Report leads with a report on Federal CIO Tony Scott partly blaming the way Congress funds agencies for the 2015 breach of computers at the Office of Management and Budget that exposed 21.5 million records.
To the annals of super-bad historical mega breaches that no one knew about, add two new entries: Dropbox and Last.fm. Hackers reportedly stole tens of millions of usernames and passwords from each in 2012.
Visualizing the attack surface of your entire enterprise can help you respond faster to emerging threats, prevent data breaches, reduce overall security risks and better understand your security status on a daily basis. Learn how to identify areas of greatest risk with deep insight into Indicators of Exposure (IOEs),...