With the federal government clearly in the bullseye of hackers, the Department of Veterans Affairs is revamping its cybersecurity strategy under its new CIO, LaVerne Council, who took over the job last month.
Millions of Android devices are at risk from "Certifi-gate," a flaw that OEMs must patch, Check Point warns. Following Stagefright, Google and some manufacturers have promised to deliver monthly Android patches.
Nothing says "you really screwed up" like receiving the Pwnie Award for "Most Epic Fail" at the annual Black Hat conference. Hence it's no surprise that in the wake of its mega breach, the win goes to the U.S. Office of Personnel Management.
Medical billing company Intermedix, part of Advanced Data Processing, faces a lawsuit in the wake of a breach that resulted in a prison sentence for a former employee who pleaded guilty in a tax fraud case. Find out more about this unusual suit targeting a business associate.
Numerous services are enabled by default in Microsoft's Windows 10, and as employees connect their BYOD equipment to corporate networks, the cloud, collaboration and location tie-ins could pose enterprise security risks, experts warn.
Privacy advocates in the Senate will get their chance to introduce amendments to the Cybersecurity Information Sharing Act. But a deal struck by Senate leaders means they must wait till after Labor Day as lawmakers head home for their August holiday.
Enough talk about the cybersecurity skills gap; it's time for a new strategy for filling it, says ISACA's Eddie Schwartz. The new CSX Practitioner certification is a step in the right direction, he says.
Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.
Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.
The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.
The Black Hat conference features presentations that have already led to very public warnings about remotely hackable flaws in everything from Jeep Cherokees and Linux-powered rifles to Android mobile devices and Mac OS X.
Health data breach statistics for 2015 are stunning. So far this year, just the top five breaches have impacted 99.3 million individuals. And all five involved hacker attacks. Security experts discuss what's going on - and what can be done to mitigate the risks.
"Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.