Government Web portals are the digital equivalent of a city hall, county agency or state office, where constituents and business owners can do everything from paying parking tickets, filing taxes or applying for health insurance to viewing legislative sessions or obtaining information in a public emergency. Despite...
During 2015, federal departments collectively reported 77,183 cybersecurity incidents, a 10 percent increase from 2014. Despite these increases, there does seem to be a silver lining: government is getting better and more capable at responding to cyberattacks.
Download this report to learn:
The specific areas...
Sweden has ended a seven-year rape investigation against WikiLeaks founder Julian Assange. But it's far from the end of the legal troubles for the man whose spilling of secrets has shaped world politics.
Information security and fraud departments at financial institutions need to improve their collaboration to help fight multichannel cyberattacks, say John Buzzard and Paul Love of CO-OP Financial Services.
Beyond improving their patch management practices, what else can organizations do to avoid falling victim to ransomware attacks such as WannaCry? Security expert Doug Copley offers advice.
The ongoing struggle to protect sensitive credit card data will continue to escalate. One of the requirements used to tackle this problem is the Payment Card Industry Data Security Standard (PCI DSS). However, one of the biggest challenges for PCI DSS compliance initiatives is treating the standard as a unique and...
A series of email alerts from the Department of Health and Human Services about the WannaCry ransomware campaign - and a number of related daily conference calls with industry stakeholders - appear to be part of a ramped-up push to improve cyber information sharing in the healthcare sector.
New legislation calls for an overhaul of the federal government's software vulnerability disclosure policies following the ransomware outbreak that was fueled by the leak of a stolen National Security Agency cyberweapon.
The House of Representatives has passed the Modernizing Government Technology Act, which supporters contend could help improve the security of the government's information networks. "It will keep our digital infrastructure safe from cyberattacks while saving billions of dollars," says bill sponsor Rep. Will Hurd.
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different...
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems. Yet, 36 percent also say their organizations were victims of ransomware in the past year.
These are among the results of...
The National Institute of Standards and Technology has issued draft guidance on how federal agencies can implement the NIST Framework for Improving Critical Infrastructure for Cybersecurity.
Internet of things devices are vulnerable to an array of potential cyberattacks, including zero-day exploits, distributed denial-of-service attacks and passive wiretapping, according to a new GAO report, which cites mitigation advice from experts.
The WannaCry ransomware outbreak is being billed as one of the most severe cybersecurity episodes the world has ever seen. Here's a teardown of the WannaCry campaign as well as the investigation.
President Trump's recently signed cybersecurity executive order, which requires federal agencies to use the NIST cybersecurity framework, highlights strategies that some security experts would like all healthcare organizations to follow as well.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.