Seeking to boost participation by federal agencies and cloud-service providers in the security vetting program known as FedRAMP, the General Services Administration has issued a two-year roadmap aimed at improving and enhancing the initiative.
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
A tiny Illinois hospital was the target of an extortion scheme in which an anonymous e-mailer threatened to make public patients' information. The incident shows why providers of all sizes need to be prepared to deal with emerging threats.
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
The healthcare sector can learn three important lessons from the recent hack attack on Sony Pictures Entertainment, which compromised employee health data, says breach resolution expert Michael Bruemmer of Experian.
A breach notification letter sent by Sony Pictures Entertainment to its employees offers a conclusive look at the amount of personal information, including healthcare data, taken by hackers following a Nov. 24 "wiper" malware attack.
This past year saw the revelation of three massive security bugs that existed for lengthy periods of time before they were discovered. This infographic details those exploits and just how long they went unnoticed.
The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID theft incident that resulted in tax refund fraud, and a related class action lawsuit, illustrate that insider threats are a major ongoing challenge, two privacy experts say.
Three weeks after attackers launched a wiper malware attack against Sony Pictures Entertainment and began leaking stolen data, Sony has threatened legal action against media outlets that publish related information.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
HHS is acknowledging the need to ensure healthcare organizations of all sizes have timely access to the latest cyberthreat intelligence. But the agency needs to take prompt, bold leadership action on this issue.
Legislation approved by Congress seeks to cement the long-term role of the National Institute of Standards and Technology in working with industry to develop cybersecurity best practices that critical infrastructure operators can voluntarily adopt.