From DDoS attacks to concerns over the reliability of VPNs, the remote workforce is facing an unprecedented array of security challenges, says Tony Lauro of Akamai, who offers strategies to mitigate these risks and ensure business continuity.
Continuous authentication can play a key role in combating fraud, says John Buzzard, lead fraud and security analyst at Javelin Strategy & Research, who discusses the role of behavioral biometrics.
Criminals are continuing to capitalize on the new opportunities being created by the ongoing COVID-19 pandemic to hone their phishing, scams, ransomware and other schemes, says Craig Jones, who leads the global cybercrime program for INTERPOL.
What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?" Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers.
The latest edition of the ISMG Security Report analyzes the latest developments in banning Huawei technology from 5G networks. Also featured are discussions of how to respond better to cybercrime and whether we're on the cusp of a digital currency revolution.
The Institute of International Finance, a global association of financial institutions, is focusing on strategies for using digital identification and machine learning to combat financial crime, says Matthew Ekberg, a senior policy adviser at the institute.
Several prominent business executives and politicians, including Joe Biden, Elon Musk and Bill Gates, had their Twitter accounts hijacked in what appears to be a cryptocurrency scam, according to news reports. Some security experts believe that two-factor authentication protections failed.
Britain's U-turn on Huawei, announcing that it will now ban the manufacturer's gear from its 5G networks, highlights this as yet unresolved problem: Years of underinvestment and policy failures have left Britain and its allies with no inexpensive, trusted alternative.
The British government has officially reversed course and will now ban Huawei's telecom gear from its 5G networks. The ban on use of the Chinese firm's equipment, based in part on U.S. sanctions against the manufacturer, goes into effect at year's end.
Auction website LiveAuctioneers has acknowledged that it sustained a data breach in June. The announcement came after threat intelligence firm CloudSEK reported that it discovered about 3.4 million LiveAutioneers customers' records had been posted for sale on a darknet forum.
An Israeli court has dismissed a petition filed by Amnesty International that sought to revoke the security export license of NSO Group, a tech firm that's been accused of selling hacking tools to governments for targeting dissidents, journalists and lawyers.
It's common for security researchers to be ignored when reporting a software vulnerability. The latest example - vulnerabilities found by Independent Security Evaluators in a router made by China-based Tenda.
Enterprises want to make greater use of connected devices to develop new services and gain efficiencies, but security is a paramount concern. Piers Hogarth-Scott and Katherine Robins of KPMG break down the risks and the challenges around IoT security.
The lessons of the Mirai botnet's abuse of internet-connected devices four years ago have been taken to heart, says Aaron Guzman of OWASP, which is working with others to improve security benchmarks and testing for connected devices.
Manufacturers are increasingly adding connectivity to everyday devices, but it's not always evident how privacy and security is managed. Detailed technical labels could give purchasers more insight, says Pardis Emami-Naeini, a post-doctoral scholar at Carnegie Mellon University.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.