In a rare settlement of a data breach class action lawsuit, Tampa General Hospital has agreed to pay plaintiffs who alleged they're at risk for identity theft as a result of insider incidents. But was the settlement amount appropriate?
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system? Kurt Bertone of Fidelis Cybersecurity lays out what to look for in a next-gen IPS.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
Dailymotion, the popular Vivendi-owned video website, has allegedly suffered a data beach that may affect 87 million accounts, according to a report from stolen data aggregator LeakedSource.
Hacker incidents continue to dominate major breaches reported to the Department of Health and Human Services. Among the latest incidents added to the HHS tally: an attack at an Atlanta clinic affecting more than 530,000 individuals. What can be done to address the risks?
Hackers apparently stole $31 million from accounts that banks keep at Russia's central bank in a series of cyberattacks this year, according to several news reports. The news comes as the country's security service also claims to have fought off broader attacks against the financial services industry.
Law enforcement officials in the U.S., Europe and Asia say they've dismantled a resilient network used by cybercriminals to infect tens of millions of computers with malicious software.
Cyber espionage and other increasingly sophisticated nation-state cyberattacks will escalate into what amounts to "cyberwar" in 2017, predicts security expert Michael Bruemmer of Experian Data Breach Resolution.
Because so many major data breaches involve using compromised privileged credentials, organizations must ramp up their credential management efforts, says Gerrit Lansing of CyberArk.
Encrypting healthcare data is a no-brainer, right? It keeps your organization off the Wall of Shame in the event of a breach, and it's just the right thing to do. So, why are so many healthcare entities still failing to encrypt?
Upgrading endpoint protection is an important step toward mitigating the risk of sophisticated ransomware and other malware attacks, says George Kaminski of Palo Alto Networks.
Cyberattacks waged by organized crime groups are simultaneously targeting a wider array of industries worldwide, which is why cross-industry threat information sharing is more critical than ever, says Brian Engle, executive director of the Retail Cyber Intelligence Sharing Center.
The Internet Archive, a pioneering 20-petabyte digital repository, is raising funds to replicate its data in Canada. The group's founder fears that the election of Donald Trump as the next U.S. president portends an uncertain privacy rights future.
Britain has enacted a new mass surveillance law - the Investigatory Powers Act - which will allow the government to demand backdoors from tech companies to intercept communications. But at what cost?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.