Adhering to the Payment Card Industry Data Security Standard (PCI DSS) is one way that organizations attempt to protect their customers' sensitive payment card data from attack. However, PCI DSS compliance provides only a baseline for securing cardholder data. In this age of mobile, social and cloud computing,...
Security threats are very real, and the stakes are higher than ever on today's information-centric and interconnected world. Ever-growing numbers of attacks can affect - and originate from - any country in the world. And these attacks are becoming more dynamic, more complex and more malicious all the...
As government agencies continue to face increasingly hazardous IT security threats, they are constantly challenged to keep these threats at bay while protecting sensitive - and often classified - data. To help them address these challenges, the US Department of Homeland Security (DHS) has been developing a process for...
When you have a smartphone or mobile device, the world is at your fingertips. Every day, there are new possibilities for mobile entertainment, shopping, banking, connecting socially and getting work done. But the speed at which mobile technology is changing has created dangerous gaps in security, and cybercriminals...
In the last year, some of the world's most prominent retailers have suffered the most devastating data security failures ever. The fallout from these episodes has been enormously damaging, both in direct financial costs as well as in terms of customer trust and goodwill: one major retailer hit by an attack saw a 46%...
Organizations are under increasing pressure to prevent security breaches by sophisticated teams that seek to steal sensitive data or other proprietary information - attacks that potentially put the organization, its employees or its customers at great risk. These targeted attacks are designed by skilled, innovative...
The ubiquitous connectivity of the "things" that enrich our lives, from thermostats to automobiles to medical devices, means software development is happening adjacent to cutting-edge technology developed by hardware manufacturers. The security industry can help guide the development of security practices for embedded...
The U.S. Justice Department has charged three men - two are in custody - for hacks against email service providers - including Epsilon - that allegedly resulted in the theft of 1 billion email addresses, many later used in massive spam campaigns.
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
British police over the course of this week launched 25 cybercrime-targeting raids and made 57 arrests, including suspects who have been tied to a U.S. Defense Department network intrusion, Lizard Squad attacks, as well as a massive Yahoo breach.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Weaponized roller coasters? Kidnappers hacking babycams? Forget over-the-top "CSI: Cyber" hacking plots. The hackers behind the Rogers ISP breach, in their quest for bitcoins, claim they wielded nothing more serious than a telephone call.
As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected.
Understanding the Cyber...
Many midsize companies have reached a critical moment with their network security: They must reinforce their traditional security solution to address new trends arising from mobility and cloud, and meet a rising threat landscape. These dynamics complicate the challenge of maintaining network security, and tax the...
The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.