How can we secure access to mission-critical workloads on cloud-based infrastructure without increasing risk, operational friction, or introducing compliance violations?
As security professionals, we're trying to solve today's complex problems, but are hampered by yesterday's tools. Fortunately, there are...
Bryce Austin is a certified chief information security manager who weathered the storm as a senior group manager at Target during the retailer's November 2013 breach - a breach that resulted in the exposure of 40 million payment cards and personally identifiable information linked to an additional 70 million...
In a reminder of HIPAA's tough requirements for breach notification, federal regulators have issued a $475,000 financial settlement and corrective action plan for Chicago-based Presence Health tied to its tardy notification for a 2013 paper records breach affecting only about 800 individuals.
Community Health Plan of Washington, a not-for-profit insurance company, says a security vulnerability on the computer network of a business associate resulted in a breach affecting nearly 400,000 individuals.
"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
In an interview about cybersecurity metrics, Olcott...
In the wake of new cyber initiatives in the U.K., how should banks and other businesses be working with law enforcement? In this session, a panel of legal, technical and law-enforcement experts will discuss what well-prepared organizations are doing right, when it comes to proactive interaction with law enforcement,...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
There is an infinite amount of malware code at attackers' disposal yet a finite number of skilled security staff able to deal with
the volume of noise they create daily. If the last year of unending breach headlines is a barometer, it's safe to assume that legacy
approaches to security will not cut it in this new...
In the latest in a string of major cyber-attacks in the healthcare sector, UCLA Health confirms that information on 4.5 million individuals may have been exposed when hackers breached its network in an attack that appears to have begun last September.
As the number of major health data breaches continues to climb, federal regulators are taking steps to make the process of reporting breaches using online tools more efficient, hoping that will help ease the launching of investigations.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
Community Health Systems, which operates 206 hospitals, says a network breach exposed 4.5 million patients' personal information. Forensics experts believe the attacker was an "advanced persistent threat group originating from China."