The 30-day Cybersecurity Sprint overseen by Federal CIO Tony Scott has crossed the finish line, but in reality, it looks more like a starting gate to a marathon to get the federal government to secure its battered IT.
Although they apparently weren't caused by cyber-attacks, the impacts of computer failures at the New York Stock Exchange, United Airlines and the Wall Street Journal have much in common with the aftermath of breaches.
As federal lawmakers return this week from their Independence Day recess, Congress picks up where it left off before the break: holding hearings on the Office of Personnel Management breach that exposed the personal records of millions of government workers.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
Unlike previous presidential campaigns, cybersecurity will be raised by candidates on the hustings, although the issue likely won't play a big role in determining the election. Two GOP candidates - Marco Rubio and Rand Paul - already have broached the topic.
Facebook dismisses reports that a brief Jan. 26 outage was triggered by either U.S. blizzard conditions or the hacking group Lizard Squad. The social network blames the hour-long outage on an internal, technical problem.
As the East Coast braces for a blizzard, information security experts say organizations in the path of the storm should be preparing to launch their business continuity plans - including making arrangements for those forced to work at home.
New comments from the CEO of Sony Pictures about the film studio's response in the aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack risks.
Healthcare organizations and their business associates need to make three important resolutions in 2015 to better safeguard patient data and avoid the enforcement wrath of regulators.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
An HHS watchdog agency plans a number of information security reviews, ranging from examining oversight of hospitals' medical device cybersecurity to sizing up electronic health record contingency planning.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Boston Children's Hospital CIO Daniel Nigrin, M.D., describes the impact of a recent DDoS attack on the medical center and lessons that other healthcare facilities can learn from that event.
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.