DDoS attacks are getting larger in size and shorter in duration at a time when multicloud environments, which lack a single point of monitoring, are becoming more common, says Ashley Stephenson, CEO of Corero Network Security, who offers risk management insights.
Healthcare organizations need to plan ahead for the financial burden of data breaches stemming from cyberattacks and also take preventive steps to help minimize those expenses, says attorney Laura Hammargren of the law firm Mayer Brown.
JavaScript sniffers - specialized malware that skims credit card information and other data from online shopping - are becoming far more prevalent, with several cybercriminal groups using the malware to target victims all over the world, a new analysis by security firm Group-IB finds.
After months of review, a Georgia-based healthcare system has determined that a cyberattack last year exposed the protected health information of more than 278,000 individuals. Meanwhile, federal regulators have issued an alert about advanced persistent threats.
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.
Sen. Elizabeth Warren, D-Mass, has introduced legislation that would pave the way for top executives at major corporations to face criminal charges if their company's wrongdoing leads to harm, such as a major data breach. While business groups immediately criticized the plan, consumer advocates praised it.
Federal investigators have opened a counterintelligence investigation into possible spying by the Chinese government following the arrest of a 32-year old woman at the Trump Organization's Mar-a-Lago private club in Florida last week, according to the Miami Herald.
Jason Costain of the Royal Bank of Scotland and Brett Beranek of Nuance Communications share a real world example of mitigating fraud with voice biometrics in a call center.
Ex-black hat Alissa Knight recently joined Aite Group's new cybersecurity practice, and among her first tasks: a hard look at the security of major financial institutions' mobile banking apps. The results may surprise you.
Keynotes and briefings at the recent 28th annual RSA Conference 2019 covered a wide range of topics, including privacy, hackers, cyber extortion, machine learning, artificial intelligence, human psychology, legal matters, career advice and internet-connected device concerns. Here are 15 highlights.
Traditional security processes and controls don't translate cleanly to containers, says Sabree Blackmon of Docker, who does not recommend treating containers as virtual machines to help maximize the benefits.
To help prevent breaches involving telehealth, it's critical that only the minimum amount of patient data be shared when delivering remote healthcare services, says Scott Anderson, CTO at Conversa Health.
Two third-party Facebook application developers exposed users' personal information by leaving the data exposed without a password in unsecured Amazon Web Services S3 buckets, researchers from UpGuard say. One data set contained 540 million unsecured records, the report found.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.