To stay ahead of evolving cyber threats, healthcare entities need to deploy a defense-in-depth strategy that includes tapping more advanced tools, including deception technology, says security expert Elie Nasrallah of HITRUST.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.
In this in-depth interview, Daniel Cohen of RSA discusses how open banking, also known as banking as a service, will affect the fight against fraud and offers insights on the security steps banks should be taking.
Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.
The Reserve Bank of India is requiring that payment system operators store all their data domestically. Many security practitioners and payment companies in India have lauded the move, stating that the mandate could lead to quicker resolution of breach cases.
The Department of Health and Human Services is warning the healthcare sector about ongoing attacks involving SamSam ransomware that have impacted at least eight U.S. organizations so far this year. What mitigation steps are recommended?
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.
A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit. But Google, which owns YouTube, says that tampering didn't occur directly on its platform.
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
At the first of two Congressional hearings this week, Facebook CEO Mark Zuckerberg on Tuesday faced questions from Republicans and Democrats alike about whether the government should more closely regulate his firm and others.
How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud - and prepare for the unexpected.
When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.
Business email compromise attacks that impersonate executives and business partners to trick employees are "the biggest security issue in all of technology today," says Dan Hoffmann of Agari.
Over 200,000 Cisco network switches worldwide reportedly were hacked Friday, apparently affecting critical infrastructure of large internet service providers and data centers across the world, especially in Iran, Russia, the United States, China, Europe and India. What remediation steps should be taken?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.