To know how best to respond to IT and communications failures, organizations first must collect information on such incidents, says Marnix Dekker, who co-authored a just-issued report on incidents for ENISA.
Healthcare providers participating in health information exchanges can learn from the experiences of New York hospitals affected by Superstorm Sandy. Find out the data storage lessons.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
If President Obama's second term were a movie sequel, I'd call it "Unfinished Business." It's time to step up and see through the cybersecurity initiatives Obama spoke about when he first took office.
A breach at a Texas credit union shows how fraudsters target financial institution employees to gain access to sensitive information. Why are institutions proving to be soft spots for compromise?
One of the biggest IT security challenges enterprises will face in the coming years will be assuring the integrity of the computer products they purchase, says Gartner Fellow Neil MacDonald.
Text-messaging by physicians and other clinicians poses serious potential patient privacy risks. But with security controls in place, some healthcare organizations are giving a green light to texting in certain circumstances.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
On the same day Citi's online and mobile-banking channels went down for undisclosed reasons, Homeland Security Secretary Janet Napolitano said top U.S. banks are "actively under attack."
A self-proclaimed member of the hacktivist group Izz ad-Din al-Qassam Cyber Fighters says Iran is not backing DDoS attacks against leading U.S. banks. What else did he reveal about the DDoS attacks?
How big of a role did health information exchanges play in providing access to records during Superstorm Sandy, and what lessons can be learned? Federal officials will address these questions, says HIE expert Lee Stevens.
In the northeastern U.S., millions of residents are still coping with the devastation caused by Superstorm Sandy. Find out whether business continuity/disaster recovery plans are proving to be effective.
Top Department of Homeland Security officials, including Secretary Janet Napolitano and Deputy Undersecretary Mark Weatherford, are emphasizing the need for the department to increase its IT security workforce and skills.
DDoS attacks against large organizations shouldn't come as a surprise anymore, says attorney Ronald Raether, who says institutions should be better prepared to communicate the incidents to the public.
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.