Russian national Yevgeniy Nikulin, 30, has been extradited to the U.S. from the Czech Republic to face charges that he hacked LinkedIn, Dropbox and Formspring, offering at least some stolen data for sale.
Cyber SOCs, the next generation of security operations centers, need to use a new approach to detecting emerging attacks, says Aadesh Gawde of the IT risk consultancy ProVise Consulting, who offers implementation tips.
The year's CrowdStrike® Global Threat Report offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. It contains valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security...
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to innovate? This whitepaper discusses healthcare's complex convergence of innovation and compliance.
While this is a very...
During this workshop, Troutman Sanders partner Ron Raether will discuss the benefits of table top exercises. He then will explain how to conduct an effective exercise walking through mock incidents and explaining the process. Participants will:
Walk through several common incident scenarios and observe lessons to be...
Malaysia's central bank, Bank Negara Malaysia, says it detected and successfully blocked an attack that attempted to steal funds via fraudulent SWIFT interbank money-moving messages. The attack against BNM led the central bank of the Philippines to issue an alert to banks in that country.
Department store chains Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor have suffered a data breach that apparently exposed details on 5 million payment cards. Cybersecurity firm Gemini Advisory says the JokerStash syndicate - aka Carbanak gang - is selling the stolen card data.
The technologies and processes that businesses deploy today are so tightly linked to their customers and markets that the
boundary between the company's internal operations and external
ecosystem (i.e., customers, markets, competitors, partners,
regulators) is rapidly disappearing. Business leaders are
...
Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? This whitepaper takes a deep dive into discussing how to mitigate omnichannel fraud and why it is not just a banking issue. There is a need for...
Modernizing IT infrastructures by simplifying and automating workflows and processes can unlock capabilities that deliver on the digital transformation goals of your organization. Infrastructure modernization efforts across government, telecommunications, retail and the financial sector are a logical step toward...
Allowing PHI to wrongfully get outside a healthcare organization's network can create sizeable regulatory and financial consequences for organizations and erode public trust. In order to understand how organizations are addressing these challenges, the healthcare IT data and insights company KLAS spoke with 100...
With HHS dramatically stepping up HIPAA enforcement, including the broader Phase 2 audits, it's more important than ever to make sure you have the right people, processes and technology in place.
Download this whitepaper and learn how DLP helps healthcare organizations:
Discover and safeguard unencrypted...
High-quality care requires healthcare organizations to protect PHI/ePHI beyond baseline HIPAA compliance. Many healthcare organizations are taking further steps to strengthen their data protection in the wake of costly data breaches that hit the industry in recent years.
Download this whitepaper and learn about...
Healthcare organizations have patient data dispersed in more than one database and across cloud, network and endpoints. Healthcare security teams are challenged to find a balance between patient data security and easy access for medial team to this information.
Download this whitepaper and learn about:
Healthcare...
As security professionals struggle with how to keep up with non-stop threats from every angle, data loss prevention (DLP) is hot again. A number of macro trends are driving the wider adoption of DLP.
Download this guide on DLP and learn about:
How DLP has evolved;
The shift to data-centric security;
Determining...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.