In some respects, government agencies enter the cybersecurity arena with one hand
already tied behind their backs. It's accepted: They are under great public scrutiny in terms
of their financial spending. They are challenged to recruit and retain qualified staff. And yet
they are still a favored target of...
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.
As the use of telehealth continues to surge during the COVID-19 crisis, healthcare entities and their vendors must take critical steps to keep patient data private and secure, says attorney Janine Anthony Bowen.
Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
After a surge in the use of remote access and telehealth technologies during the pandemic, widespread use of this approach to care is expected to continue, raising concerns about security and privacy. Mark Baik of Palo Alto Networks and Thomas Duffey of Accenture preview new research findings on the subject.
Data security is top of mind for organizations today.
But given the current trend for remote work, the increasing number of phishing attacks, and the surge in the use of microservices and APIs, achieving multi-level security is more challenging than ever.
This whitepaper takes an in-depth look at these aspects and...
COVID-19 has altered the state of modern healthcare delivery, resulting in an unprecedented paradigm shift. Current circumstances have been catalytic in extending remote access for care providers and essential to deliver virtual healthcare for distant patients. It is now a given that this "new normal" will persist...
With most of the world working from home for the past few months, and many using this time to research new technologies and keep up with the ever-evolving IT and Security landscapes, many questions remain. Especially with the emergence of the Gartner-coined SASE (Secure Access Service Edge) model for doing business on...
For the second time within a week, it's been revealed that sensitive voice messages containing patients' information have been exposed on the internet. The latest discovery involves unsecured voice transcripts of patient calls to drug giant Pfizer's automated customer support system.
Fraudsters are sending phishing emails with messages about the Coinbase cryptocurrency exchange to Microsoft Office 365 users in an attempt to take over their inboxes and gain access to data, according to the security firm KnowBe4.
The U.S. indictment charging that six Russian GRU military intelligence officers were responsible for numerous cyberattacks highlights Moscow's seemingly unending appetite for online destruction. Experts say more than indictments will be required to curb such activity.
A critical infrastructure company wanted to manage their cybersecurity in a holistic way. As an organization with both information technology and multiple operational technology functions, they were missing a centralized dashboard and support system for cybersecurity management and improvement.
Download this case...
Has the nation-state threat become like the weather - something everyone talks about, but no one can do anything about? It's time for a strategic change. A panel of experts offers a frank discussion of nation-state actors, their ongoing intrusions and what "taking off the gloves" might look like.