For many organizations, digital transformation arrived over a weekend in March. Now they look ahead and wonder "what next?" re: authentication, privacy and third-party risk. In a webinar preview, RSA CTO Zulfikar Ramzan shares his vision of cybersecurity in 2021.
Phishing scams continue to be a leading cause of health data breaches so far this year. But the theft of unencrypted laptops led to the biggest breach reported in 2020, and an insider breach involving a physician exposed data on thousands of patients.
The Federal Trade Commission is assessing whether to make changes to a seldom-used, decade-old health data breach notification rule for certain technology vendors that do not fall under the umbrella of HIPAA.
After offering three large databases of compromised user data for sale on the darknet last week, a hacking group known as Shiny Hunters now is trying to sell four additional databases of information apparently gathered from data breaches, security researchers say.
Zoom has reached a settlement with the New York state attorney general's office to provide better security and privacy controls for its videoconferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.
The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.
Today, privacy extends to a wide range of personal data and informa-tion that may be stored on personal digital devices, in corporate data centers and even in the cloud. In this ebook, we'll explore how building trust can help you build your business in a privacy-conscious world and focus on the principles that form...
Federal regulators are alerting healthcare organizations about an array of coronavirus-themed cyberthreats. Plus, they're advising them to avoid potential HIPAA privacy violations involving unauthorized disclosures of patient information to news outlets during the COVID-19 crisis.
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?
Traditional perimeter defenses are dead and organizations are under greater pressure to embrace new approaches to cyber security that reduce costs, increase ROI and provide business resilience in light of the current climate with Covid-19.
With 2020 being a year for safe bets only, this webinar will reflect on...
Google and Apple on Monday released privacy and security guidelines for their jointly developed contact-tracing infrastructure. The companies note that apps developed using their APIs can only be developed by or for public health authorities - and solely to collect information to trace COVID-19 infections.
The ability to support remote workers can help improve an organization's business continuity plan. It allows the organization to adapt when unforeseen circumstances, such as natural disasters or a pandemic, make it impossible for employees to work on-site.
Under these circumstances, an organization may be forced to...
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.
Ransomware, phishing, extortion scams - they all are
using COVID-19 themes. But socially engineered attacks
were already on the rise before the pandemic, say Olesia
Klevchuk and Nishant Taneja of Barracuda, who share
insights on the evolution of cloud-based email defences.
Download this eBook to learn more...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.