Leading this week's industry news roundup, FireEye partners with Verizon to offer mobile threat protection services as ForeScout partners with McAfee to deliver endpoint protection.
In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.
Last week, Karen DeSalvo, M.D., was promoted to acting assistant secretary of health to help with the nation's Ebola response. This week, the Office of the National Coordinator for Health IT says she will also maintain her ONC leadership role.
Hackers have breached an unclassified network used by the White House. The attack reportedly lasted two weeks or more, and was only discovered after an ally alerted U.S. officials to the breach.
The federal government's point man on the cybersecurity framework, Adam Sedgewick of NIST, responds to a critique by Larry Clinton of the Internet Security Alliance on the failure of NIST to outline the financial benefits of the framework.
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing e-mails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.
A watchdog agency says the Internal Revenue Service needs to put into place additional procedures to ensure that Obamacare health insurance exchanges safeguard consumer tax information. Learn what's recommended.
A U.S. federal court has shut down what the FTC alleges was a fake tech-support firm that posed as Facebook and Microsoft and tricked consumers into paying up to $600 each for bogus security tools.
Steph Warren, CIO of the U.S. Department of Veterans Affairs, provides an overview of the VA's cybersecurity landscape and reveals what security issue keeps him up at night.
The annual Amsterdam gathering of information security aficionados detailed the very latest hacking threats, including cybersecurity attacks via drone, sniffing data from fitness devices, and exploiting ATMs using Raspberry Pi computers.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Leading this week's industry news roundup, Intel introduces a solution that provides end-to-end encryption of consumer and financial data built into POS systems, while Arbor Networks launches Peakflow, a DDoS mitigation solution.
Security vendor Proofpoint warns that a "malvertising" campaign has been launching ransomware attacks against users of numerous high-profile websites, including search site Yahoo, dating site Match.com, and an AOL real estate site.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.