The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
An internal CIA report from 2017 - just released in heavily redacted form - found that the agency's failure to secure its own systems facilitated the massive "Vault 7" data breach that enabled classified information, including details of 35 CIA hacking tools, to be leaked to WikiLeaks.
A radiology technician allegedly inappropriately accessed thousands of patient records for more than eight years, according to a newly filed breach report from Kaiser Permanente Health Plan of the Mid-Atlantic States. The incident is yet another example of the challenges of dealing with insider threats.
A former administrative employee of a medical marijuana clinic and several other clinics was recently sentenced to serve time in federal prison after pleading guilty to identity theft and wire fraud. The case illustrates the potential risks posed by employees inappropriately using personal devices.
In the aftermath of the COVID-19 pandemic, the abruptness and unprecedented scale at which organizations have advised employees to work remotely, has given rise to complex and widespread IT security challenges; bringing into sharp focus the lack of preparation to meet such contingencies, and the pervasive...
A former IT administrator for an Atlanta-based building products distribution company has been sentenced to 18 months in federal prison after he sabotaged the firm by changing router passwords and damaging a critical command server. Overall, Charles E. Taylor caused more than $800,000 in damages.
By now, most IT teams have a handle on work-from-home and many are looking ahead to the days when offices will re-open, and users will go back to work. For some, getting the office back up and running is as simple as turning everything back on, but for others, there's lots of work to be done.
In this webinar,...
Three recent incidents involving inappropriate use of patient information by insiders illustrate how difficult it is for healthcare organizations to deal with the insider threat. Security experts offer risk mitigation advice.
Even in the best of economic circumstances, enterprises face risks of insiders stealing data or selling access to systems. But Joseph Blankenship of Forrester says the possibility of layoffs due to the COVID-19 pandemic puts enterprises at more risk of insider threats.
In trying economic times, it's more important than ever to be able to measure and communicate the effectiveness of one's cybersecurity program. Colin O'Connor, COO of ReliaQuest, offers a new alternative to traditional metrics.
The lines are rapidly blurring between traditional fraud and rising cybersecurity threats. Financial services leaders are challenged to find ways to rapidly increase visibility across their environments while accelerating responses to threats effectively and efficiently.
Join Jason Pfeiffer, VP of Product Management...
The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.