To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward.
The social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists. But is the terrorist group likely to launch cyber-attacks?
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
Senior leaders are often faced with tough budget decisions. That's why winning support for an investment in an identity and access management tools requires painting a clear picture of the value to the business.
PeaceHealth, a healthcare system in the Pacific Northwest, has devised a practical way to apply the NIST Cybersecurity Framework to its breach prevention efforts. Learn about the steps involved.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
To honor our loyal readers, and to invite even more of their comments, we're debuting a new, weekly infographic entitled ISMG Buzz, in which we offer a "best of" compilation of the latest insights.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
Peruse the agenda for the Black Hat security conference that's being held this week in Las Vegas and you'll get a peek at some of the major cybersecurity challenges ahead - and potential solutions.
Attackers increasingly focus on software vulnerabilities in what application security expert Anthony Lim calls "the invisible onslaught." How can the CISO exert more control over software development?
Healthcare IT security experts weigh in on whether the new alliance of IBM and Apple could potentially help transform the iPhone and iPad from favorite personal devices used by clinicians to enterprise-sanctioned, secure mobile platforms.
Characterizing the state of employment among American information security practitioners, executive recruiter Joyce Brocaglia says, "We are experiencing negative unemployment in the field of information security."
Oracle has stopped supporting XP, but promises the next update for Java 7 -- though not Java 8 -- will still run on XP. But for how long will this continue? Security experts chart XP's "downward spiral."
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.