Experts evaluating the likelihood of a hack to alter votes in this year's American presidential election highlights the latest edition of the ISMG Security Report. Also, U.S. federal regulators propose new cybersecurity rules for big banks.
In the twelfth HIPAA enforcement action so far this year, federal regulators have smacked St. Joseph Health System with a $2 million penalty after investigating a breach that exposed patient information to internet searches for more than a year. And more enforcement actions tied to other breaches are on the way.
The FBI calls and notifies you of a payment card breach, and every compromised card is linked to a transaction with your organization. Quickly: Who stole the data? How did they get access?
Register for this session to participate in a mock payment card breach investigation using Dell Software's IT Security Search....
The National Health Information Sharing and Analysis Center aims to better engage smaller healthcare organizations in cyber threat information sharing, leveraging funds from two recent federal grants. Denise Anderson, president of NH-ISAC, describes the plans in this in-depth interview.
Understanding the difference between cybersecurity crisis management and security incident response could be critical to your organization's survival. In this blog, a CISO offers insights on creating an effective crisis management plan.
In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture.
In an interview about achieving resilient cybersecurity, Kaczmarek discusses:
How security leaders can prioritize their defenses again the many threats they face;
The benefits of using a hybrid...
Verizon is reportedly awaiting the full results of a digital forensic investigation into the record-setting Yahoo data breach to ascertain whether it will revise its $4.8 billion bid to buy the search firm. Did the breach have a "material impact" on Yahoo's business? That's the question.
If you look beyond the political bickering and study the cybersecurity platforms that presidential candidates Hillary Clinton and Donald Trump have posted on their campaign websites, you'll see that their approaches are similar in some respects.
In 2016, three absolute facts are relevant when it comes to security: 1) an organization cannot prevent all attacks; 2) an organization's network is going to be compromised; and 3) 100% security does not exist. This means that adversaries will breach your organization's protection — if they haven't already. The...
IT security industry has developed new methods and technologies to help reduce the threat of a major breach while reducing the cost of day-today upkeep. The common way of protecting systems is to employ discrete tools such as software intrusion detection and firewalls. A more efficient and sophisticated approach,...
Hacker attacks continue to account for the vast majority of health data breach victims this year, according to the latest federal tally. Some security experts expect that trend will persist as long as many organizations focus narrowly on HIPAA compliance rather than larger cybersecurity issues.
It's a story you'll watch unfold time and time again. The breach. The headlines. The confusion. The public apologies. The finger-pointing. And it's often followed by some form of the following: "But I was compliant." Compliance is never enough. The challenges are understandable. Taking the path of least resistance is...
Britain's privacy watchdog agency has slammed the telecommunications company TalkTalk with a record fine of £400,000 ($511,000) for multiple information security failings that allowed a hacker to bypass access controls and exfiltrate customer data "with ease."
Britain has launched a new National Cyber Security Center to help U.K. organizations better respond to cybersecurity incidents. But Brexit is imperiling intelligence-sharing arrangements that help the U.K. battle attacks and track cybercriminals.