A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
Cybercriminals broke into the payment card processing system used by the Madison Square Garden Co., owner of Radio City Music Hall and other iconic entertainment venues, harvesting payment card details for nearly a year.
The mobile workforce has arrived, and employees everywhere are leveraging the convenience of their smartphones and tablets. But while workers enjoy the freedom of being slightly less tethered to their desks, IT minds the security risks.
Mobile device management (MDM) lets IT be the voice of reason while granting...
The traditional definition of attack vectors has not necessarily evolved. On the other hand, the methods, means and ease of access most certainly have. It is debatable whether it is now easier for exploits to reach the public domain, however their impacts leave little doubts. Ingenuous hackers, each with his own...
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organizations. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. This suggests the problem is not a technological one, but rather one of strategy in dealing with cyber...
Three Mobile, one of the largest U.K. mobile providers, saw more than 132,000 accounts breached in a scam in which fraudsters ordered new devices for customers and then tried to intercept the deliveries.
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.
Adobe will pay a small financial penalty to 15 states to resolve consumer protection and privacy claims following a data breach that affected 38 million active user accounts. The company's legal fees associated with the incident are likely far higher than the settlement amount, experts say.
Did you know that Ransomware was cited as the leading attack by 55% of respondents in the 2016 SANS Financial Services Survey? On the other hand, ransomware is the second most common attack, reported in the 2016 SANS Healthcare Survey. Rather than dying, antivirus is actually growing up. Today, organizations look to...
Do your competitors and peers have a better cybersecurity game plan than you? If simply answering that question seems exhausting, this eBook is here to help.
Today's chief information officer knows they can't outsource risk. Yet every year, cyber risk demands more and more time from the already-busy CIO.
This...
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
A week after hackers apparently breached the websites of seven Indian embassies, one of the attackers claims to have breached an Indian consulate in the U.S. and posted data online to draw attention to vulnerabilities.
FriendFinder Networks, which runs thousands of adult-themed sites in what it describes as a "thriving sex community," may have been breached again, according to a website that collects stolen data.
From ransomware to targeted social engineering attacks, the threats to healthcare entities have changed enormously. Isn't it time for healthcare's cybersecurity strategy to change, too? That's the premise of Optum's Aaron Rinehart.
Rinehart, the Chief Enterprise Security Architect at Optum, comes from a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.