As cybersecurity threats in the healthcare sector evolve, medical device manufacturer ICU Medical is taking a number of steps to help safeguard its products. Chaitanya Srinivasamurthy and Marshall Fryman of the company describe these security initiatives.
Many security professionals are constantly drowning in alerts across a multitude of security tools. When you can't see what is happening on your endpoints, investigating an alert can feel like you're running blindfolded. Often, these professionals don't have the visibility or data to prioritize alerts or make...
Some 22 health data breaches reported to regulators in 2019 - including hacking incidents and thefts of unencrypted devices - already have been added to the official federal tally, with business associates involved in six of the largest incidents.
Endpoint detection and response tools and other related security technologies are critical weapons for defending against cyberattacks, says Larry Whiteside, the new CISO at Greenway Health, an electronic health records company.
Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners.
With the explosion of poorly secured IoT devices being regularly herded into larger and larger botnets, it's hardly a surprise that DDoS attacks are now so common and damaging. What is surprising, is that many companies still lack adequate protection against these attacks, especially in an era when Internet...
Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually...
As the value of cryptocurrency has plummeted, so too have the number of cryptomining infections being seen in the wild, reports security firm Malwarebytes. Taking its place, however, are criminals wielding advanced malware such as Emotet and Trickbot.
The coming end-of-support for Windows Server 2008 leaves organizations with few viable options to receive updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
Fresh strains of ransomware are being distributed by attackers who gain remote access to organizations' networks to infect them with Phobos, as well as via cracked-software sites that share adware installers inside which STOP ransomware has been hidden.
Venture capitalists invested $5.3 billion in cybersecurity companies in 2018, about 20 percent more than in 2017 and twice as much as 2016, according to research from Strategic Cyber Ventures. What's ahead for 2019 and beyond?
Leading the latest edition of the ISMG Security Report is an in-depth look at why ransomware remains a pervasive threat and how it's evolving. Also featured: updates on venture capital investments in cybersecurity and a study of vulnerabilities in industrial remotes.