Healthcare organizations can learn important lessons - including the need for granular data access control - from the costly proposed settlement of the breach lawsuit against health insurer Anthem, says Bill Fox, a former federal prosecutor.
It can be incredibly disruptive and time-consuming to add new security technologies to your network. However, it is vital to continue to advance your organization's ability to detect and respond to advanced malware - especially malware that evades other "advanced" security tools like sandboxes and...
The global WannaCry ransomware attack that recently struck organizations across multiple continents is a grim reminder of how prevalent these cyberattacks have become. Adversaries are not only launching ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and...
The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace.
This report asserts that many such breaches could be prevented...
The Department of Homeland Security has issued an alert warning about cyber vulnerabilities in certain Siemens medical imaging products running Windows 7 that could allow hackers to "remotely execute arbitrary code." How serious are the risks?
British national Marcus Hutchins, aka "MalwareTech," has been arrested by the FBI on charges relating to the distribution of the Kronos banking Trojan. Hutchins is the "accidental hero" who singlehandedly defused the WannaCry ransomware outbreak.
How will ransomware-as-a-service develop? What IoT exploits await the enterprise?
The view starts with the evolution of malware - both the potency and the low-cost barrier to deploy it, says Dan Schiappa, senior vice president and general manager, Sophos end-user and network security groups. He is specifically...
A hacker attack on a women's healthcare clinic that impacted 300,000 patients ranks as the second largest ransomware-related health data breach reported to federal regulators. Why did it take months before the clinic detected the malware?
The ISMG Security Report leads with an analysis of when it would be appropriate for the United States and Russia to engage in cybersecurity negotiations. Also, how NotPetya malware attack victims continue to struggle weeks later.
Security comes to Las Vegas this week in the form of Black Hat USA 2017. Hot sessions range from an analysis of power grid malware and "cyber fear as a service" to details of two major hacker takedowns and how the world's two largest ransomware families cash out their attacks.
Medical transcription software vendor Nuance is the latest company to acknowledge that it's still struggling to recover from the recent global NotPetya ransomware attacks and will see a dip in its financial performance as a result.
It's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking attacks. AlienVault's Javvad Malik and Chris Doman detail how crowdsourced threat intelligence can help in the fight against this threat.
While the U.K. is beefing up funding for hospital cybersecurity, in the U.S., some Congressional leaders are pushing for moves that could have the unintended consequence of sapping security investments by some healthcare providers.
Many security leaders argue over whether their incident response posture needs to be proactive or reactive. But Rsam CISO Bryan Timmerman says it isn't either or - that organizations need both. Here's why.
"If you've got an incident response program that's been around for years, then it's probably based on...